Re: Legal response to real abuse

2010-08-07 Thread David Carlson

On 8/7/2010 6:36 AM, and...@torproject.org wrote:

On Fri, Aug 06, 2010 at 11:48:36PM -0700, mikepe...@fscked.org wrote 3.4K bytes 
in 84 lines about:
: Now personally, I think that what might be more likely to win you
: points with your ISP is to reiterate that these events are
: extremely rare in comparison to the number of requests and the amount
: of traffic that you carry. The overwhelming majority of people are
: using the service legitimately, and the incident rate is close to that
: of the normal Internet.

In the past, I've modified my exit policy to reject the specific IP
address and port in question to address the abuse complaint.  Shown the
modified exit policy snippet to the ISP's Abuse dept and considered the
specific abuse complaint solved. I've stated the reject line will be
removed in X months, assuming no other abuse complaints from the same IP
address owner.

   
How can such an overly simplistic action satisfy the ISP?  That simply 
moves the abuser down the block, it does not stop him.  Is it OK if it 
is not in my back yard?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Legal response to real abuse

2010-08-07 Thread Moritz Bartl

Hi,


How can such an overly simplistic action satisfy the ISP? That simply
moves the abuser down the block, it does not stop him. Is it OK if it is
not in my back yard?


For your ISP, that's probably exactly their rationale.

The problem is that individual blocking doesn't help against the real 
issue here:


This is considered the first strike of three -- the third resulting in 
the termination of your account.


Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Legal response to real abuse

2010-08-07 Thread Jon
On Sat, Aug 7, 2010 at 8:50 AM, Moritz Bartl t...@wiredwings.com wrote:
 Hi,


 This is considered the first strike of three -- the third resulting in the
 termination of your account.


And that is providing your ISP even lets you get to 3 strikes. From my
phone experience. tho it was not a letter DMCA and probably just a
scare tactic, but was told if I didn't resolve the problem of the
server being used for copyright infringements, etc, my account would
be terminated.

Even with the explanation, they didn't care cause of the complaints.
However, I said I would take care of the problem if you give me the
ports this was allegedly happening on. I then just blocked them and
have had no issues since then. By doing this, I still have a full exit
server running, and didnt lose the account and the ISP was happy.

Personally I don't trust the 3 strikes your out syndrome. Unless its
in the contract, I believe most ISP's can cancel the contract if they
believe their subscriber does not seem to want to take care of the
problem and the ISP has the paper work with the allegations, etc. But
I am not a lawyer.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Legal response to real abuse

2010-08-07 Thread Wendy Seltzer
  On Sat, Aug 7, 2010 at 2:48 AM, Mike Perry mikepe...@fscked.org wrote:
 Ideally, it would be great to hear from Wendy, Seth, and/or Peter to

You called?  :)

As far as the law goes, ISPs should not face liability for users' bad
acts if they do not specifically assist or benefit from them.  They
offer general-purpose transit (like, but not quite the same as common
carriage, which is defined by law both to prohibit discrimination and
to remove liability).  Tor node operators should be in a similar
position -- we're offering general purpose technology, for plenty of
uses recognized as lawful, and can't block particular uses without
breaking the generality and limiting the functionality of the node.
This is mostly common law (contributory and vicarious liability, or
aiding and abetting), not statute.

Unfortunately, what the ISP can lawfully do, and what it chooses to
allow customers to do are often far apart.  They're often motivated by
how much nuisance someone else causes them, rather than the law.  If
you can share with me (we...@seltzer.org) some of the complaints, I
will think about additional responses to use in the persuasion.

--Wendy

-- 
Wendy Seltzer
http://wendy.seltzer.org/blog/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Firefox,Torbutton leaks real IP Address.

2008-12-05 Thread Luis Maceira
I can't reproduce the event of leakage the real IP address within the initial 
period of establishing the first circuit.I have tried with the same settings: 
Firefox,Torbutton,Privoxy
but now Firefox waits the necessary period till establishement of the 
circuit,only then,the page www.showmyip.com etc. is displayed,with the IP 
address of the Tor exit node.So,I am considering the hypothesis that in the two 
times I noticed the leakage of the real IP address,was not my IP address,but 
the IP address of an exit node in my country (same flag) within the range of 
dynamic IP addresses of my DSL provider(and I wrongly thought it was 
mine).Anyway,now I tested with tor-0.2.0.32(compiled from source) and 
Iceweasel-3.0.4.(more recent versions).When I noticed the leakage(perhaps
it was not) I verified that the torbutton was green and privoxy was setup(as 
always is).



  


  

Re: Firefox,Torbutton leaks real IP Address.

2008-12-04 Thread Curious Kid
The Are you using Tor? page at http://check.torproject.org/ sometimes tells 
me that I am not using Tor, even with Tor and Torbutton running. It has only 
done that soon after starting Tor and the browser.





From: Luis Maceira [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, December 3, 2008 2:15:27 PM
Subject: Firefox,Torbutton leaks real IP Address.


The combination Firefox-3.0.3(in fact,Iceweasel-3.0.3),Torbutton-1.2.0 leaks my 
real IP
address.This happens BETWEEN when I initiate Tor-0.2.0.31 with the bash command 
/usr/local/tor/bin/tor and the moment when Tor effectively establishes a 
connection-circuit.
This can be 60 seconds or more,and if in between we connect to the Internet with
Firefox-Torbutton the real IP address is used(even with torbutton running-green)
I tested with www.showmyip.com and others.My fear is if the same could happen 
when Tor changes circuit by ten-ten minutes or so,when leaves the previous 
circuit to the next one.(what happens in the transition moments).I did not test 
that situation.
Thanks.  



  

Re: Firefox,Torbutton leaks real IP Address.

2008-12-03 Thread Ringo Kamens
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Luis Maceira wrote:
 The combination Firefox-3.0.3(in fact,Iceweasel-3.0.3),Torbutton-1.2.0 leaks 
 my real IPaddress.This happens BETWEEN when I initiate Tor-0.2.0.31 with the 
 bash command /usr/local/tor/bin/tor and the moment when Tor effectively 
 establishes a connection-circuit.This can be 60 seconds or more,and if in 
 between we connect to the Internet withFirefox-Torbutton the real IP address 
 is used(even with torbutton running-green)I tested with www.showmyip.com and 
 others.My fear is if the same could happen when Tor changes circuit by 
 ten-ten minutes or so,when leaves the previous circuit to the next one.(what 
 happens in the transition moments).I did not test that situation. 
Thanks. 
 
 
   
Whenever tor is switching circuits, I just get a proxy error and I'm
never actually able to get to a page. Did you install Tor from source?
If not, where did you get it?
Ringo
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFJNwGU6pWcWSc5BE4RApFwAJ4whn5J4knfxgpdYX6GDq97Pi8JCQCgl4Mu
c4ycKWr6yEUj/We28V6SFss=
=zD1O
-END PGP SIGNATURE-


Re: Firefox,Torbutton leaks real IP Address.

2008-12-03 Thread dr . _no
Hi,

i think the main problem is that via java/javacript the browser can do direct
connections, bypassing your proxy and only using your default gateway!
You can see this bypassing with test sites like 
https://www.jondos.de/de/anontest .

That's why i am not using a default gateway on the PC i am using and usually you
only need proxy and no default gateway (behind the Router with the firewall and 
proxy).
For some situations like updating my homepage via ssh/rsync i'm using 
a default gateway but only for a short time (approx. 1 minute) and at
that time i'm using no browser.

Regards,

Rolf


 The combination Firefox-3.0.3(in fact,Iceweasel-3.0.3),Torbutton-1.2.
 0 leaks my real IP
 address.This happens BETWEEN when I initiate Tor-0.2.0.31 with the 
 bash command 
 /usr/local/tor/bin/tor and the moment when Tor effectively establishes 
 a connection-circuit.
 This can be 60 seconds or more,and if in between we connect to the 
 Internet with
 Firefox-Torbutton the real IP address is used(even with torbutton 
 running-green)
 I tested with www.showmyip.com and others.My fear is if the same 
 could happen when Tor changes circuit by ten-ten minutes or so,when 
 leaves the previous circuit to the next one.(what happens in the 
 transition moments).I did not test that situation.
 
  Thanks. 
 
 




Re: Firefox,Torbutton leaks real IP Address.

2008-12-03 Thread phobos
On Wed, Dec 03, 2008 at 11:15:27AM -0800, [EMAIL PROTECTED] wrote 2.0K bytes in 
34 lines about:
: The combination Firefox-3.0.3(in fact,Iceweasel-3.0.3),Torbutton-1.2.0 leaks 
my real IPaddress.This happens BETWEEN when I initiate Tor-0.2.0.31 with the 
bash command /usr/local/tor/bin/tor and the moment when Tor effectively 
establishes a connection-circuit.This can be 60 seconds or more,and if in 
between we connect to the Internet withFirefox-Torbutton the real IP address is 
used(even with torbutton running-green)I tested with www.showmyip.com and 
others.My fear is if the same could happen when Tor changes circuit by ten-ten 
minutes or so,when leaves the previous circuit to the next one.(what happens in 
the transition moments).I did not test that situation.                          
                          Thanks. 

Is torbutton enabled in Firefox the entire time?  When I try to
replicate this, Firefox reports the socks proxy isn't available.

Are you using Firefox directly with Tor?  Or do you have privoxy/polipo
in between Firefox and Tor?

-- 
Andrew


Re: Is this for real?

2007-04-12 Thread JT
Hi,

 The problem is that it does not scale 1:1.
 
 If you set aside the biggest problems:
 - Users with firewalls/NAT routers and lack of knowhow to set them up
 correctly.

If they can use Tor to surf they should be able to let the Tor server
component also access it. Same program. Don't understand this arguement.

 - Increased use increases incentives for the bad guys, _especially_ if
 a vulnerability is discovered. Everyone would be vulnerable.

What is the point. The same thing right now. If a vulnerability is
discovered then people must update immediately. Who says that all people
running Tor servers right now are computer whizzes?

 The reason it does not scale 1:1 is that (in EU at least),
 Internet-access to the users are provided mostly asymmetrically. My
 new connection has an awesome 20Mbit downstream, and the whole of
 1Mbit upstream. Even with the fastest (consumer) subscription I'm not
 able to host a TOR server if I'm also going to use other services
 (VoIP, etc.).

Yes, but if everybody gets the download speed that he provides for
upload then it scales perfectly. In your case 1M.
 
 And I wouldn't approve of the whole forcing-people either, at least by
 my own moral standards, especially not in a freedom-project like this!

Where is the force. That would just be the way the program works! Same
thing with emule, freenet, etc, etc. Give and take. No harm done.
I wasn't saying that everybody should become an exit node.

JT
-- 
  JT
  [EMAIL PROTECTED]

-- 
http://www.fastmail.fm - Faster than the air-speed velocity of an
  unladen european swallow



Re: Is this for real?

2007-04-12 Thread Freemor
On Wed, 2007-11-04 at 23:18 -0700, JT wrote:
 Hi,
 
  The problem is that it does not scale 1:1.
  
  If you set aside the biggest problems:
  - Users with firewalls/NAT routers and lack of knowhow to set them up
  correctly.
 
 If they can use Tor to surf they should be able to let the Tor server
 component also access it. Same program. Don't understand this arguement.

Surfing with Tor uses outbound connections, being a server requires
inbound connections. Inbound connections will break against a NAT/router
that isn't configured correctly as the Nat/router hasn't been told to
which internal IP to route incoming connections on a given port. 

same is true for many Firewalls.




  
  And I wouldn't approve of the whole forcing-people either, at least by
  my own moral standards, especially not in a freedom-project like this!
 
 Where is the force. That would just be the way the program works! Same
 thing with emule, freenet, etc, etc. Give and take. No harm done.
 I wasn't saying that everybody should become an exit node.
 

Being just the way the program works is force. Just as a government
that has a rule we shoot all dissidents without question.. sorry that's
just the way we work is force.

  Now providing someone can solve the NAT problem without using UPNP or
breaking anonymity I still wouldn't like to see a Tor implementation
that defaults to a server. NAT/router/firewall aside there are other
problems, Bandwidth shaping/throttling by ISP's, On many ISP's running a
server of any kind is a direct violation of their terms and
conditions, in some jurisdictions running a Tor server may be illegal
where using the client isn't, etc.

  So, if Tor were to come server as default it absolutely must have a
very simple way to turn the server off permanently, which breaks the
whole reasoning for having Tor be server default and you might as well
just provide an easy way to turn the server on and let the user decide
based on his, network, isp, legal situation, etc.  



--

Freemor [EMAIL PROTECTED]
Freemor [EMAIL PROTECTED]

This e-mail has been digitally signed with GnuPG




signature.asc
Description: This is a digitally signed message part


Re: Is this for real?

2007-04-12 Thread Michael_google gmail_Gersten

 The problem is that it does not scale 1:1.

Yes, but if everybody gets the download speed that he provides for
upload then it scales perfectly. In your case 1M.


False.

If there is one site in the chain that has, for example, a 20K bps
upload speed, then no traffic through that site can provide data
faster than 20K bps.

If I have a 6 Mbps cable link, and my tor traffic is going through
someone's DSL that cannot upload more than 20Kbps, then I will see my
speed drop from 6Mbps down to .020Mbps.

That's going from 6,000 K down to 20K.

That is why the current tor system [b] cannot [/b] scale, without tor
using multiple connections at once.


Re: Is this for real?

2007-04-12 Thread Michael_google gmail_Gersten

If I have a 6 Mbps cable link, and my tor traffic is going through
someone's DSL that cannot upload more than 20Kbps, then I will see my
speed drop from 6Mbps down to .020Mbps.


Gar, double check. I'm mixing bytes and bits.

6 M-bits-ps cable versus 20K-bytes-ps DSL.

That's actually about 250K-bits-ps.

Or 6,000K down to 250K. About a 25 times factor slowdown.

Yes, I've seen 6Mbps cable download (at a friend's house; mine never
went above 4Mbps).


Re: Is this for real?

2007-04-11 Thread Stian Øvrevåge

On 4/11/07, Thomas M. Jett [EMAIL PROTECTED] wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Quick question then, *how* much bandwidth is required to run Tor as a
server, or router?  I've only recently upgraded to DSL light (can't
afford full DSL, and I don't remember the advertised bandwidth, but
using my ISP's bandwidth test it shows 118.6 kbps with a maximum
download speed of 14.83 kbps).  Now I'm sure full DSL has more than
enough bandwidth, but as far as DSL light goes, I'm not sure.
Wouldn't be that much of a concern except for the fact that I do quiet
a bit of downloading and I don't know how much of an effect that will
have on performance.  I know you can limit the bandwidth in the torrc
file, but if it's going to be cutting it very close it may not be that
much of a help.

JT wrote:
| Hi,
|
| if every Tor user was a router these kind of concerns wouldn't even pop
| up. Who cares if the NSA is running a few routers in a pool of 300 000.
| More and more people are stopping to use Tor because surfing has become
| unbearbly slow. Just doesn't scale. Every Tor user must also be a router
| and it scales 1:1!
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGHKZRlzq1/FLekkARClBxAJ9+5ca2Pj98H63ouhv9+0wd72WkRQCfQyj8
CtsvY5TFQyQX75u2AZ+tPRM=
=vKiu
-END PGP SIGNATURE-




The problem is that it does not scale 1:1.

If you set aside the biggest problems:
- Users with firewalls/NAT routers and lack of knowhow to set them up correctly.
- Increased use increases incentives for the bad guys, _especially_ if
a vulnerability is discovered. Everyone would be vulnerable.
- Anonymous users can simply be port-sweeped (and/or banner-scanned) for.

The reason it does not scale 1:1 is that (in EU at least),
Internet-access to the users are provided mostly asymmetrically. My
new connection has an awesome 20Mbit downstream, and the whole of
1Mbit upstream. Even with the fastest (consumer) subscription I'm not
able to host a TOR server if I'm also going to use other services
(VoIP, etc.).

And I wouldn't approve of the whole forcing-people either, at least by
my own moral standards, especially not in a freedom-project like this!

--
Stian Øvrevåge


Re: Is this for real?

2007-04-11 Thread Michael_google gmail_Gersten

The whole point of You are limited by the slowest upload speed of
your routers, plus the whole My un-tor'd download speed is great is
a big concern.

Here is a thought. Since most of the time I'm not downloading -- most
of the time my connection is idle with tor traffic -- I don't mind
giving more of my traffic to others.

When I'm active, I want to make full use of my download bandwidth.
That means I need to get downloads from multiple people.

If I'm looking at 20K tor upload, and 1.5 MB download (about 150K),
then I need to download from 7 different tor nodes. At once. Yes,
there are fast routers, but if I ever get a slow one, or an overloaded
one, then I am slowed for using Tor, and Tor looks unattractive.

If an average user is active 10% of the time, and uses 7 connections
when active, that's still a surplus of network resources (70%
utilized).

That means, that for Tor to get fast,
1. Rather than everything using one connection by default, we need to
use many connections, load balanced. Round robin is probably a good
first approximation to load balanced. Since we know the speed of the
routers we are using, we can do a better approximation.
2. ???
(3. Profit :-).

(Yea, getting keep-alive to work will help a lot with web browsing,
but that means tossing privoxy and using something else. But
keep-alive, by reducing the number of connections, will magnify the
problem of a slow router over doing multiple connections.)


*how* much bandwidth is required to run Tor as a server, or router?


Tor wants a minimum of 20K, or about 220 kbps. DSL Light, that I've
seen, has a 384kbps upload, although I've heard that it goes as low as
256 kbps up. Either one is sufficient to run Tor as a router.


Re: Is this for real?

2007-04-01 Thread Stian Øvrevåge

On 4/1/07, xiando [EMAIL PROTECTED] wrote:

 I just opened Tork and there in the server list was a server named
 NSAFortMeade.  Is this for real, or is the NSA running a Tor Server?
 If it's for real, it's going to spook a lot of people away from Tor,
 at least those who are inclined to use Tor for political reasons.

In bullet summary, we know:

1. Tor comes from the US Naval Research Laboratory, which is a DoD Corporation
2. NSA is also a DoD Corporation. This is very important to remember, it's
the NSA!!!? NO. NSA is a part of Depertment of Defense.
3. Mr. Dingledine, Mr. Mathewson and Mr. Syverson make no secret that DoD use
Tor.
4. HOW do the DoD get THEIR network security? From MY Tor-servers.
5. HOW do I get MY network security? From DoD using Tor!

See? I pop out of the Tor-network. It could be me. It could be the NSA, or any
other branch of US DoD.

So, should DoD-subsidiaries like NSA run fast Tor-servers? YES! And that is
exactly how YOU get increased security!

You really should realize that DIVERSITY is how I get the security properties
I want.

Let me put it like this:

Let's say ONLY people who are inclined to use Tor for political reasons were
running Tor-servers. He's using Tor!! He has political reasons for using it!
GET HIM!? -OR- He's using Tor! He COULD be a political activist. Or he
COULD be the NSA. Or he COULD use it simply because he don't want websites
tracking what products he's looked at in the past. Or he COULD .. etc.

If the entire Tor-network was run by US DoD then Yes, that really would be
bad. But if US DoD runs 5% of it? GREAT. We really NEED FAST SERVERS! My view
is that US DoD, and their subsidiaries such as NSA, really SHOULD run
servers. So should China. And Russia. And Venezuela. That is how we get
diversity!

In bullet summary, here's what I have to say about not only DoD/NSA, but ANY
single entity running a Tor-network, regardless of what you think of them:

You're running 1-5% of the servers? GREAT! THANKS!

You're running MORE than 5% of the servers? WHAT ARE YOU UP TO?

Helping the Tor-network is great. Regardless of you think those doing it are
bad, because it gives diversity and better network security. Only start
paying attention if one single entity are suddently running a large
percentage of the network - DoD/NSA running 50% of the Tor-servers? That
would raise my eyebrows



That's a great assesment xiando. Say that this actually IS NSA (for
which there is no proof afaik), why automatically assume it's because
they are hunting down thought criminals?

The NSA Mission Statement is posted at http://www.nsa.gov/about/about3.cfm :
The ability to understand the secret communications of our foreign
adversaries while protecting our own communications -- a capability in
which the United States leads the world -- gives our nation a unique
advantage.

This might as well be an effort of the latter as an effort of the
first. But ofcourse, we'll never know for sure...

--
Stian Øvrevåge


Re: Is this for real?

2007-03-31 Thread Thomas M. Jett

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Yeah, that's the problem, given it says NSA, who knows for sure.  As
arrogant as govt. has gotten in the last few years it would not
surprise me one bit to see them run a server under that name.

Ringo Kamens wrote:
| Yeah I also noticed that server. I get routed through it a lot as an
| entry guard. Based on the IP I don't think the NSA runs it but who
| knows.
| Ringo Kamens
|
| On 3/31/07, Thomas M. Jett [EMAIL PROTECTED] wrote:
| I just opened Tork and there in the server list was a server named
| NSAFortMeade.  Is this for real, or is the NSA running a Tor Server?
| If it's for real, it's going to spook a lot of people away from Tor,
| at least those who are inclined to use Tor for political reasons.
|
| PS: let me ad an addendum, the server in question is in the
| Routers/Entry Guards list.
|
|
|

| .

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGDma1lzq1/FLekkARCp9jAJ9HDtHkJgAN047i2oyZ3kaS6POb9QCfROVL
S0D/woWzcjRJ/EfEIpwxm3Y=
=5JnC
-END PGP SIGNATURE-



Re: Is this for real?

2007-03-31 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 Yeah, that's the problem, given it says NSA, who knows for sure.  As
 arrogant as govt. has gotten in the last few years it would not
 surprise me one bit to see them run a server under that name.

But wouldn't they have even more fun, if they called their server
WeLovePrivacy? At least, I would have, if I were them... ;)

Don't worry, the probability that it's an NSA server is the same as for
every other server in the Tor network.

Karsten
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGDmj50M+WPffBEmURApuKAJ41aZS/OgkrljDaX/KkK+XzGLU1zwCfZl4S
Wrgmie15uH96Wtf6hYgjVhE=
=J1BJ
-END PGP SIGNATURE-


Re: Is this for real?

2007-03-31 Thread Thomas M. Jett

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Well, that's the problem with power, those in power enjoy rubbing it
in the face of those they have power over.  Remember, I believe it was
Lord Acton who said power corrupts, and absolute power corrupts
absolutely.  While I doubt it's a serious threat, still the potential
exists, and given the current political climate it would not surprise
me if they ran a server under a name like that just to scare people
into not using Tor.

Karsten Loesing wrote:
|  Yeah, that's the problem, given it says NSA, who knows for sure.  As
|  arrogant as govt. has gotten in the last few years it would not
|  surprise me one bit to see them run a server under that name.
|
| But wouldn't they have even more fun, if they called their server
| WeLovePrivacy? At least, I would have, if I were them... ;)
|
| Don't worry, the probability that it's an NSA server is the same as for
| every other server in the Tor network.
|
| Karsten

.

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGDmrwlzq1/FLekkARCrUxAKCPxNSyB/9+ZE9NGo/yC7HWAesPoQCgh02E
SwZGwUtaEFtxG2DqZSJoTHQ=
=+u4y
-END PGP SIGNATURE-



Re: Is this for real?

2007-03-31 Thread Alexander W. Janssen

On 3/31/07, Karsten Loesing [EMAIL PROTECTED] wrote:

But who knows? Perhaps they have multiple strategies? :)


Sorry, I can't help myself, but I'm tempted to rename my node to
something intriguing just for the fun of it.
Fear and Loathing in Fort Meade :)

Names mean nothing.


Karsten


Alex.


--
I am tired of all this sort of thing called science here... We have spent
millions in that sort of thing for the last few years, and it is time it
should be stopped.
-- Simon Cameron, U.S. Senator, on the Smithsonian Institute, 1901.


Re: Is this for real?

2007-03-31 Thread Thomas M. Jett

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

The most likely person to be scared, and the one that the NSA would
want to scare, would be a political activist.  Most, but not all of
them (I fall into the category of not all of them ;-) ) are not all
that technically inclined, and use Tor based upon faith that it will
give them an anonymous means to research, and in some cases
communicate over a highly monitored  internet.

In other words, the intent would be to create a chilling effect.
Not all would fall for it, but perhaps enough to diminish the positive
effects (upon freedom of speech  expression, especially political
speech) of Tor.

Perhaps, because of the intimidating strategy used by the present
occupants of 1600 Penn. Ave. I'm expecting this type of thing, but
history tends to prove my concerns in this regard.  Just look at the
actions of governments in the past, all have used intimidation as a
means of quelling dissent.


Karsten Loesing wrote:
|  ... it would not surprise
|  me if they ran a server under a name like that just to scare people
|  into not using Tor.
|
| That's an interesting issue. Who is scared by a suspicious server name
| and would thereupon stop using Tor? Not the absolute beginner who does
| not care about log files and not the expert who knows that an attacker
| needs all 3 out of 900+ routers a user chooses to subvert her privacy.
|
| However, I assume that the NSA would rather run 10, 20, or 50 nodes with
| inconspicuous names, sit back, and see what they can observe. But who
| knows? Perhaps they have multiple strategies? :)
|
| Karsten

.

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGDnTylzq1/FLekkARCsEAAJ0Rywvj5LFt+gE3uNHv5fFHOSm6yACfbkfp
/HYby9dQSjpFzB5KZxmiMxg=
=sCiI
-END PGP SIGNATURE-