Re: [tor-relays] Anonbox Project
On Fri, Oct 17, 2014 at 3:36 PM, Colin Mahns wrote: > It looks like Kickstarter has suspended the project. Some of this thread seems a bit silly. Tor does one thing, it anonymizes your IP address. These boxes push everything through that, which is generally exactly what you want... no leaks. So great, go sell a million of them. But some of this thread bashes the boxes for doing simply that. I say NO. If you want a teacher to handhold and teach you anything safe beyond how to be an anon IP address (which Tor and boxen already provide) ... such as system administration, session management, how to actually be contextually, network, and datawise anon... go kickstart a companion book on that. Don't just bash the boxen about not including such a book if you are not also willing to write the book... as the boxen exist to sell 'IP address anonymizers', not books. Chinese lookalikes, and best interaction with Tor network, are also separate subjects. To the latter which is relavent, Tor is becoming very popular, its fundamental design and ops need planned to be able to scale to many millions of clients, like yesterday perhaps. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
It looks like Kickstarter has suspended the project. http://www.wired.com/2014/10/kickstarter-suspends-anonabox Colin On October 15, 2014 9:47:09 AM EDT, isis wrote: >Sven Reissmann transcribed 2.4K bytes: >> Hi there, >> >> I recently read about the anonbox project [1], a small >hardware-router, >> which allows end-users to connect their whole LAN to the Tor network. >> The project is on kickstarter at the moment [2]. >> >> Has there already been a discussion on how this might affect the >> performance of the Tor network? > >Yes and no. > >One of the Anonabox developers, August Germar, posted to their >kickstarter >page that the distributed Anonaboxes would have a checkout option to be >relays/bridges by default. [0] Colin Mahns responded to this, [1] >pointing out >some of my recent discussions with Mike Perry and others on the tor-dev >list >on scaling the Tor network. [2] [3] (And August Germar responded in >their >Reddit AMA. [4]) > >I agree with Colin that the Anonabox folks seem to be well-intentioned. >However, the network effects, were these routers to be distributed, and >were a >majority of them to be configured as relays by default, would likely be >harmful due to the low bandwidth of most residential connections. > >That said, I think that everyone here would welcome the chance for a >pocket-sized FLOSS router which enforces safe Tor usage. If that is >their >goal, and they are able to communicate honestly with users, I'd like to >help >them succeed. Particularly if it means someone else does hardware >development, >since that's not really my jam. :) > >[0]: >https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router/posts/1017625 >[1]: >https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router/posts/1017625?cursor=8115567#comment-8115566 >[2]: >https://lists.torproject.org/pipermail/tor-dev/2014-September/007558.html >[3]: >https://lists.torproject.org/pipermail/tor-dev/2014-September/007560.html >[4]: >https://www.reddit.com/r/anonabox/comments/2ja22g/hi_im_august_germar_a_developer_for_the_anonabox/cl9u17k > >-- > ♥Ⓐ isis agora lovecruft >_ >OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35 >Current Keys: https://blog.patternsinthevoid.net/isis.txt > > > > >___ >tor-relays mailing list >tor-relays@lists.torproject.org >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
On Thu, Oct 16, 2014 at 11:56:57AM -0700, Mike Perry wrote: > As a result of their claims not matching up to reality, I've been > debating writing a blog post warning about the various issues with > Anonabox I think a blog post teaching people about the issues is a fine plan. I was thinking something like: - Many people keep wanting to build a magic anonymity box. And it's really appealing to not have to change your behavior or your application settings, and just magically get anonymity, so I can understand why the idea keeps popping up. - Unfortunately, if you just route all your traffic through Tor, you're only solving half the problem: all the application-level issues remain. First this is a problem when you use your Chrome over Tor and then wonder how websites are able to recognize you anyway (remember all the protections that Tor Browser adds over vanilla Firefox). And second, as you say in your post here, it's a problem because of all the chatter that comes from background applications, update attempts, printer notifications, and so on that most systems do by default these days. - To be fair, some expert users may still get a benefit from Torifying their traffic. For example, if they've already set up a firewall to block everything they don't want talking, and now they want to use an application that's hard to configure a proxy for. Or if they have thought deeply about their threat model and they don't want a lot of the anonymity properties that Tor aims to offer. But that user is very far from the target audience for these magic anonymity boxes. - The best design we've been able to come up with is one that forces you to be using Tor on your side, and only allows your traffic through if it's coming from Tor. Making it use a proxy, or maybe even better a Tor bridge, that's running on the router seems a fine way to do this limiting. And we could also imagine running a captive portal website on the router that intercepts outgoing port 80 requests and teaches you what you need to do to use this network connection safely. Perhaps it has a local copy of Tor Browser for you (but how does the user know it's the real Tor Browser?), or perhaps it lets you reach https://www.torproject.org/ so you can fetch it yourself. - This approach sure isn't as usable as the magic anonymity box. What a great research area! But be aware that people have been thinking about this issue for several years now, and don't get fooled by solutions that brush all the above details under the rug. This may also be a good opportunity to point people at https://www.usenix.org/conference/foci14/workshop-program/presentation/edmundson --Roger ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
Andrew Lewman: > Perhaps a more constructive approach is to help define what the golden > standard for a true tor router should be at > https://trac.torproject.org/projects/tor/wiki/doc/Torouter. There are a > bunch of open tickets and design questions which need thought, research, > and solutions. FWIW, I spoke with someone named 'torrouter' in #tor-dev IRC a couple months back. I'm not sure if they were related to this project, but I pointed out that the biggest problem with a simple "torify everything" Tor router is that there are tons and tons of apps on your computer that love to make network connections and broadcast information about your computer to remote servers. This problem was first analyzed in 2008 at PETS: http://www.chiark.greenend.org.uk/~mroe/research/pets2008.pdf. Since then, we've seen the advent of app stores, account-based autoupdates, Dropbox, iCloud, things like Ubuntu's "Spotlight" search, and many many more chatty things. Not to mention the web browser tracking problem, of course. The problem with naively shoving all of this stuff over Tor is that Tor Exit nodes (and services watching for long-term Exit IP usage correlation) can see that user "AnonymousDissident1" really is the same as "frank.grimes.sf.ca@gmail.com" who has a Dropbox account that he paid with his credit card. This may not be a problem for many people, but statements like "The anonabox uses Tor to allow anyone to access the Internet anonymously without having to install any software" and "The result is strong, secure anonymity. Using the anonabox hides your location, as well as all the other personal data that leaks through ordinary Internet use" are really not something you can claim if you are operating in this way. Location in particular will probably still leak all over the place due to chatty apps you have installed that broadcast it happily. All of that said, I immediately followed this bad news up with an offer to the 'torrouter' IRC nick that I would be happy to work with them to design a secure pairing system between Tor Browser and a Tor router, such that if you were using Tor Browser, it could get configuration information from your Tor router so that it used it as an upstream proxy, or such that Tor router would then install a firewall that only allowed certain Tor Guard/bridge IPs through. In this mode, the Tor router could actually act as a defense-in-depth mechanism that would block all non-proxied traffic, providing additional protection against browser or other remote exploits, by only allowing properly Tor-configured application traffic to exit onto the Tor network. I imagine the same sort of mechanism could also be used to provide defense-in-depth for OrBot+OrWall+Android and Tails users. Unfortunately, the 'torrouter' nick stopped talking to me at this point. I'm not sure if they just didn't want to put in this extra work, or were intimidated by how much work this, or what. Granted this would not be trivial to implement, but the offer to help come up with a design for it still stands, though. We can figure out the implementation and development cost sharing details after we have a good design. I'm not sure such a thing could be designed and implemented by their January 2015 rollout date goal, but I suspect they're going to struggle to meet that anyway with this much interest. I wished they'd actually talked to us about this earlier, instead of ignoring my offer then. As a result of their claims not matching up to reality, I've been debating writing a blog post warning about the various issues with Anonabox, but that seemed premature at this point, too. I suppose it still may come to that, though, if they keep ignoring us and making extreme, unsubstantiated, and inaccurate claims, especially with our trademark and logo plastered on the thing, as if it were an endorsement, or even our product. -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
> Not everywhere does this, but coming from a Wikimedia background, I tend > to Assume Good Faith [1] wherever possible. It appears that they were > aware, so in this case it wasn't warranted, but I've found that assuming > good faith tends to lead to significantly fewer disputes. Forgot the link. [1]: https://en.wikipedia.org/wiki/WP:AGF ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
>> Out of curiosity, has anyone reached out to the guys running the Kickstarter? > > Yes. I and others have been talking to August since last week, before > the article was published and kickstarter was launched. I see. That's unfortunate then. I'm glad someone did reach out to them though. It seemed like throughout this entire thread we were missing the obvious potential solution, but it appears that was not the case. >> It's entirely possible that they are unaware of the lists or the >> issues with their design. > > How is it possible for anyone planning to make a Tor router without > being unaware of tor mailing lists? It looks like they were able to > find PORTAL from grugq, compiled, and run it. I'm sure they know tor > project mailing lists, but they do not bother to subscribe to exchange > ideas. > > Of course, it would be possible that they are unaware, but I'm really > suspicious about it. And if they are, I'm sorry to say this but it's a > shame. Not everywhere does this, but coming from a Wikimedia background, I tend to Assume Good Faith [1] wherever possible. It appears that they were aware, so in this case it wasn't warranted, but I've found that assuming good faith tends to lead to significantly fewer disputes. I think then our best bet at this point is probably to keep complaining, do some outreach and education, and prepare for the wave of Tor users and relays that don't know what they are doing. :( Thank you, Derric Atzrott ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
On Thu, 16 Oct 2014 11:31:44 -0400 "Derric Atzrott" wrote: > It's entirely possible that they are unaware of the lists or the > issues with their design. How is it possible for anyone planning to make a Tor router without being unaware of tor mailing lists? It looks like they were able to find PORTAL from grugq, compiled, and run it. I'm sure they know tor project mailing lists, but they do not bother to subscribe to exchange ideas. Of course, it would be possible that they are unaware, but I'm really suspicious about it. And if they are, I'm sorry to say this but it's a shame. Regards, Grace H. -- D8C9 EF71 ADC3 0533 29DE 3A80 1152 D1CB 8D9C 47FD signature.asc Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
On 10/16/2014 11:31 AM, Derric Atzrott wrote: > Out of curiosity, has anyone reached out to the guys running the Kickstarter? Yes. I and others have been talking to August since last week, before the article was published and kickstarter was launched. -- Andrew pgp 0x6B4D6475 https://www.torproject.org/ +1-781-948-1982 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
> Perhaps a more constructive approach is to help define what the golden > standard for a true tor router should be at > https://trac.torproject.org/projects/tor/wiki/doc/Torouter. There are a > bunch of open tickets and design questions which need thought, research, > and solutions. > > If someone wants to take this golden standard and turn it into a > shipping product, great. Best of luck. There is clearly a demand for it > and more people willing to pay for something than to build their own. Out of curiosity, has anyone reached out to the guys running the Kickstarter? "Hey, I'm from the Tor Project and we noticed a few issues with your design, would you mind hopping on the mailing list so that we can help you work these out and provide a safer and more secure product to your customers?" It's entirely possible that they are unaware of the lists or the issues with their design. I imagine if they care about their product and not just the possibly literal boat loads of money they are about to make, they'd be open to the idea. Thank you, Derric Atzrott ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
[immured to dopey snipes] http://www.wired.com/2014/10/tiny-box-can-anonymize-everything-online/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
Perhaps a more constructive approach is to help define what the golden standard for a true tor router should be at https://trac.torproject.org/projects/tor/wiki/doc/Torouter. There are a bunch of open tickets and design questions which need thought, research, and solutions. If someone wants to take this golden standard and turn it into a shipping product, great. Best of luck. There is clearly a demand for it and more people willing to pay for something than to build their own. -- Andrew pgp 0x6B4D6475 https://www.torproject.org/ +1-781-948-1982 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 10/15/2014 07:57 AM, Tom Ritter wrote: > https://www.reddit.com/r/privacy/comments/2j9caq/anonabox_tor_router_box_is_false_representation This > is what lead me to pull my financial support for this: https://twitter.com/justinsteven/status/522165101390876672 When considered in the context of the shadiness that's been discovered around the Kickstarter, there is little reason to think that the glaring vulnerabilities @justinsteven discovered are going to be fixed prior to shipment. - -- The Doctor [412/724/301/703] [ZS] Developer, Project Byzantium: http://project-byzantium.org/ PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ Broadband?! I'm using a tarot deck and an egg whisk! -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJUPxJJAAoJED1np1pUQ8RkABQP/2QLbG04via1GG4uND3cztZS tJ25xlWkysXwht5Dfo5JxdIKe9NHI8nxKqyR13rr6cVE88Fg6/FBL3xPuBfs6n5g zFWLO5uTtvfnYxoJdr9PglbOLvsP/1jogw9LXL2UMVy8LuLiqc7L362DLSq9Tk9X nyn4thWSFDcUos8g2hCFAF2I+jzNkyjoI+qwHD9A4jTrNL6j04nQJ1C2EFsd8asw 1kNNmApKstQD2fQ0t450VCpIZnea5NDyXK+7LXbubvVUmQp1dOlwiW+G1pZrqZYM jh71wMPwReHGCKaBRuPobSBW62OJNMerKx9dELa7caMtuUracivRch3V9alaASwR vZJ2Hoa/DuVpYPbjbNhZNxmUjFdi2Gi6zmcAc4u8VgPElhThcZ/dLeYNaemBK4IK zbxYWWTfPuKr6qKbcqelQDViFYq8mysKYUW/9SoBliVSzqkAnMCXCIZqPm8L4ml/ 9PtifPyKz1rLfXrZM5FSd7qc6x/CvfUB9Sy0aRabRceUcNwTHRXIXVBr1P9m88JJ OFHgRw1FnWqeUGIOXlI4MECS2Le8/ov9v+IGoRnhAKSdzrL9NoN73qtsjVE0e1Sr 3kSd/52JlKfE8DuwmiBmsviz/Uym378JCVFQkNnMeST/g/CujFfOfbeaifgKK4nb n3f78DedglQEPvyXAXu8 =AEHd -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
On Wed, Oct 15, 2014 at 01:33:43PM -0800, I wrote: > and if they were really into TOR why aren't they discussing it on this list? because they're like two guys who threw up a under-$10k kickstarter and had it completely explode under their feet, I suspect. Succeeding far beyond your dreams at crowdfunding is one of the worst things that can happen to a project. Just ask ZPM Espresso, KREYOS, or any of a dozen other "success" stories. Othermill is a sobering example of how to actually succeed at this, but it's a success I'm not sure I'd wish on my worst enemy. (Mike from othermill is a good friend of mine and I have seen just how hard it can be to succeed.) -andy ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
and if they were really into TOR why aren't they discussing it on this list? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
I was excited about this project and signed up as a backer. Then I read http://www.reddit.com/r/anonabox/comments/2ja22g/hi_im_august_germar_a_developer_for_the_anonabox/ and have reduced my contribution amount. Yes, I really like the idea of it this small device and what it does but at the same time I can see that it really *appears* that someone's allegedly selling on cheap hardware and applying a large markup. What an incredible testimony to the name of Tor though; the amount pledged with 27 days to go is approaching $500k ?! What concerns me more is that a lot of less-knowledgeable folk might sign up to be an exit node using what is really a low-power, low bandwidth device. Not good. I've since changed my pledge to $1 in recognition of the publicity, but I'll be setting up an Onion Pi and making a donation to Tor instead. --- Peter T Garner, MBCS On the Road (iPad) https://www.petergarner.net On 15 Oct 2014, at 14:47, isis wrote: > Sven Reissmann transcribed 2.4K bytes: >> Hi there, >> >> I recently read about the anonbox project [1], a small hardware-router, >> which allows end-users to connect their whole LAN to the Tor network. >> The project is on kickstarter at the moment [2]. >> >> Has there already been a discussion on how this might affect the >> performance of the Tor network? > > Yes and no. > > One of the Anonabox developers, August Germar, posted to their kickstarter > page that the distributed Anonaboxes would have a checkout option to be > relays/bridges by default. [0] Colin Mahns responded to this, [1] pointing out > some of my recent discussions with Mike Perry and others on the tor-dev list > on scaling the Tor network. [2] [3] (And August Germar responded in their > Reddit AMA. [4]) > > I agree with Colin that the Anonabox folks seem to be well-intentioned. > However, the network effects, were these routers to be distributed, and were a > majority of them to be configured as relays by default, would likely be > harmful due to the low bandwidth of most residential connections. > > That said, I think that everyone here would welcome the chance for a > pocket-sized FLOSS router which enforces safe Tor usage. If that is their > goal, and they are able to communicate honestly with users, I'd like to help > them succeed. Particularly if it means someone else does hardware development, > since that's not really my jam. :) > > [0]: > https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router/posts/1017625 > [1]: > https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router/posts/1017625?cursor=8115567#comment-8115566 > [2]: https://lists.torproject.org/pipermail/tor-dev/2014-September/007558.html > [3]: https://lists.torproject.org/pipermail/tor-dev/2014-September/007560.html > [4]: > https://www.reddit.com/r/anonabox/comments/2ja22g/hi_im_august_germar_a_developer_for_the_anonabox/cl9u17k > > -- > ♥Ⓐ isis agora lovecruft > _ > OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35 > Current Keys: https://blog.patternsinthevoid.net/isis.txt > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I understand the approach of this, but it again reverts back to the problem of people believing a product will provide them reasonable protection without the responsibility of having to take measures themselves. There are stories everyday in the newspapers who think using a fake name on Facebook is enough to stop police tracking the actions of that account to them. As in the other reply to this message, the hardware isn't open source and there has been a critique posted below: https://www.reddit.com/r/privacy/comments/2j9caq/anonabox_tor_router_box_is_false_representation Well intentioned, but as many before me have highlighted; good intentions is not enough if the product does not provide true security. Tor is a technology like many things, but I feel this product is out to make a buck from open source software while under-delivering on it's promises by providing an inferior product. How many more times do we need people to be put off Tor because somebody makes a crap implementation and a headline follows with the usual "TOR IS BROKEN"? The money in that kickstarter is proof there is cash to fund such things, but it is now in the hands of people riding the wave following the NSA fallout in hope for profit and not actual innovation. - -T On 15/10/2014 15:51, Andrew Lewman wrote: > On 10/15/2014 08:00 AM, Thomas White wrote: >> I am personally hoping somebody high up in the Tor Project >> management will openly condemn this atrocity and hopefully >> Kickstarter and the funders will withdraw their funds before a >> whole load of people buy into this "security as a tool" idea. > > I'm more inclined to support him. He appears to be taking our > designs and thoughts verbatim from Jake's initial thoughts on a > torouter[1]. Access Now did some work on the OpenWRT version of the > torouter[2]. Now is our chance to help shape this into a product we > like. Others have tried to take their own approach without such > attention to technical details. > > I look forward to having some smart people analyze the final > product and figure out where the strengths and weaknesses lie. > Anonabox's response to this analysis will tell us far more than > anything else. > > > [1] https://trac.torproject.org/projects/tor/wiki/doc/Torouter > > [2] https://trac.torproject.org/projects/tor/wiki/doc/OpenWRT > -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (MingW32) iQIcBAEBAgAGBQJUPrfNAAoJEE2uQiaesOsLubQQAJDa1egqSCNFv/ueivYNpfQN 8b7lJUaYNi6BX+E4U+/2YcVH8t6qzJaLTvKyiZCY0X4eXhcize+KFKUwKoCqDXhQ l5oXsfIG2q7+hdFNpwp3j96lOfjQ1MEqppAnoDHOV0W2AuFyA+Gm05WIjaj+VaPK Kehv6QjW61rlGexVzL1ISQu0QFzTLq/3AvpyaPgaXhyoCKQS/SztaB93/DaTBZrM lfH1gs0/oQibs6uNtPSo4kTc3Lnry9ET9fXXnC28lkJeLAkdJuhV7tyOfj6C55Kv V5lrWJG6jbOjdz0vKqf/t/1DGlHJns2dGirmbhQHDeyL+JbC5BAbPTy/ZOFbI6P5 e5tXoNbGR9oXzPvcd89yAK5FNqnoLsEl2tY5LJpB7F5KF0o1hzigmYod51L9Epda CT2aWyEeXs0q2lO4WtUME80Hfo2nerclXfErpfgUQsqrqTEiGZ8SDyVqA6PYsevV hGqXWjvGzBSB9+WriSGHnRzncVl+EH0PZHq084H0sEyKYLMRMRpUpkAyzlkQkHga 5hdL335BO0Jo5jPLG/N0IbStCBPgEGa5xPpmjxh7NJz4esPSvn+xWuL1OqfuyayO X6zcnTUD1u1jy3YUrF9CvRp2JyneU3fc6iJZhID9NJyXWDZH23NPtDbzMrS+oKXb wDTMoKJ7iqWqj0G5Q/gO =7LQU -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
I'm far from being knowledgeable about this project, but since no one else has, I'll point out some controversy around it: https://www.reddit.com/r/privacy/comments/2j9caq/anonabox_tor_router_box_is_false_representation -tom ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
On 10/15/2014 08:00 AM, Thomas White wrote: > I am personally hoping somebody high up in the Tor Project management > will openly condemn this atrocity and hopefully Kickstarter and the > funders will withdraw their funds before a whole load of people buy > into this "security as a tool" idea. I'm more inclined to support him. He appears to be taking our designs and thoughts verbatim from Jake's initial thoughts on a torouter[1]. Access Now did some work on the OpenWRT version of the torouter[2]. Now is our chance to help shape this into a product we like. Others have tried to take their own approach without such attention to technical details. I look forward to having some smart people analyze the final product and figure out where the strengths and weaknesses lie. Anonabox's response to this analysis will tell us far more than anything else. [1] https://trac.torproject.org/projects/tor/wiki/doc/Torouter [2] https://trac.torproject.org/projects/tor/wiki/doc/OpenWRT -- Andrew pgp 0x6B4D6475 https://www.torproject.org/ +1-781-948-1982 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
Sven Reissmann transcribed 2.4K bytes: > Hi there, > > I recently read about the anonbox project [1], a small hardware-router, > which allows end-users to connect their whole LAN to the Tor network. > The project is on kickstarter at the moment [2]. > > Has there already been a discussion on how this might affect the > performance of the Tor network? Yes and no. One of the Anonabox developers, August Germar, posted to their kickstarter page that the distributed Anonaboxes would have a checkout option to be relays/bridges by default. [0] Colin Mahns responded to this, [1] pointing out some of my recent discussions with Mike Perry and others on the tor-dev list on scaling the Tor network. [2] [3] (And August Germar responded in their Reddit AMA. [4]) I agree with Colin that the Anonabox folks seem to be well-intentioned. However, the network effects, were these routers to be distributed, and were a majority of them to be configured as relays by default, would likely be harmful due to the low bandwidth of most residential connections. That said, I think that everyone here would welcome the chance for a pocket-sized FLOSS router which enforces safe Tor usage. If that is their goal, and they are able to communicate honestly with users, I'd like to help them succeed. Particularly if it means someone else does hardware development, since that's not really my jam. :) [0]: https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router/posts/1017625 [1]: https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router/posts/1017625?cursor=8115567#comment-8115566 [2]: https://lists.torproject.org/pipermail/tor-dev/2014-September/007558.html [3]: https://lists.torproject.org/pipermail/tor-dev/2014-September/007560.html [4]: https://www.reddit.com/r/anonabox/comments/2ja22g/hi_im_august_germar_a_developer_for_the_anonabox/cl9u17k -- ♥Ⓐ isis agora lovecruft _ OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35 Current Keys: https://blog.patternsinthevoid.net/isis.txt signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
I have seen their website and it looks like someone is trying to sell this product though I didn't see a price tag yet. Looks dangerous. Possibly a honeypot. Thanks, Torzilla11 Sent from my Sony Xperia™ smartphone Thomas White wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >Well the topic has come up several times in the last day or two on IRC >and generally the feeling is that it may be quite bad for the users of >the product, not necessarily the Tor network however. > >One thing that AnonBox does do is increase Tor network traffic - you >can see this as both good and bad since it adds load to exit operators >like myself which are already in short supply and diversity, but at >the same time adding traffic to the network makes it safer to use for >everyone. > >The real concern is the mismarketing and borderline fraud occuring by >assuming the simple use of a protocol or open source software (which I >note, the hardware is not actually open source at all). In addition, >the users of such a system are going to be leaving an enormous browser >fingerprint and their activities will be correlated so expectation of >reasonable privacy from this project is a misguided hope at best; at >worst very dangerous to life and limb of anyone who relies on Tor for >their life. > >I am personally hoping somebody high up in the Tor Project management >will openly condemn this atrocity and hopefully Kickstarter and the >funders will withdraw their funds before a whole load of people buy >into this "security as a tool" idea. > >- -T > >On 15/10/2014 12:15, Sven Reissmann wrote: >> Hi there, >> >> I recently read about the anonbox project [1], a small >> hardware-router, which allows end-users to connect their whole LAN >> to the Tor network. The project is on kickstarter at the moment >> [2]. >> >> Has there already been a discussion on how this might affect the >> performance of the Tor network? >> >> Regards, Sven. >> >> >> [1] http://anonabox.com [2] >> https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router >> >> >> >> >> ___ tor-relays mailing >> list tor-relays@lists.torproject.org >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays >> >-BEGIN PGP SIGNATURE- >Version: GnuPG v2.0.22 (MingW32) > >iQIcBAEBAgAGBQJUPmHuAAoJEE2uQiaesOsLAOMP/j8BHqO2yIHRV8Q7Ja3aYHrv >ppLrDbjvbkV9paqGR4X8Gz71PJyHXZoOse6JfBxOnZG+mmoS9elYoXDkKoz8y5Z3 >ot/cpoQdKLei+LvmRxQ5VHcwDXx6wb35+o7I5FnvMoyH2YTeqyfAmGnb5X7D3oa7 >H5rYF8n17ttfvqHvFt2tRuZKKyskJWRnjnpkmmAJSeZpmZnRf38JGhdknmoPMXg3 >5hwzh7E9xFSMM5NrCpXDYvRdZJMvQPWdDFOVUZvKMh/magJitfBZ2Lr7cpq2Vpep >bU8Xs4z/a92j+bm3lN1jzUEgoxs7BEtn/bG2ASRJp2BufOFW8+FCTuOJQPVV0iSa >BPtjoNGe1cwBin256ODF3GjcuzS0Vbql0oS3HyYyEgYEnDjXcw05sdd9tg9i1lqk >66M8h9/aQvZZX1qB4EPzweOYM10VX7mS2pGGl+00wGkGZvhZ4k5ixP/8kHQ7OqQh >d6lwg/ZWK+6wYx3ADCKCvfD5pCNMlf4AtWgam3eQpSPw1uJuw3/twKEvuQijfhRM >XyNu3GivErIpL1d9awm0tJdqcZYZsKw/RFKN9leHt8PhYTMcSp+MViPuFaPIcYh0 >CHwj36gQTqB3XxzdnyJyzigwQhpWePs+qcmc4S3mTq8ogZsnBMgS080XocOx1Jrp >zqZfg7sOGY+s3018nntK >=SX0h >-END PGP SIGNATURE- >___ >tor-relays mailing list >tor-relays@lists.torproject.org >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Well the topic has come up several times in the last day or two on IRC and generally the feeling is that it may be quite bad for the users of the product, not necessarily the Tor network however. One thing that AnonBox does do is increase Tor network traffic - you can see this as both good and bad since it adds load to exit operators like myself which are already in short supply and diversity, but at the same time adding traffic to the network makes it safer to use for everyone. The real concern is the mismarketing and borderline fraud occuring by assuming the simple use of a protocol or open source software (which I note, the hardware is not actually open source at all). In addition, the users of such a system are going to be leaving an enormous browser fingerprint and their activities will be correlated so expectation of reasonable privacy from this project is a misguided hope at best; at worst very dangerous to life and limb of anyone who relies on Tor for their life. I am personally hoping somebody high up in the Tor Project management will openly condemn this atrocity and hopefully Kickstarter and the funders will withdraw their funds before a whole load of people buy into this "security as a tool" idea. - -T On 15/10/2014 12:15, Sven Reissmann wrote: > Hi there, > > I recently read about the anonbox project [1], a small > hardware-router, which allows end-users to connect their whole LAN > to the Tor network. The project is on kickstarter at the moment > [2]. > > Has there already been a discussion on how this might affect the > performance of the Tor network? > > Regards, Sven. > > > [1] http://anonabox.com [2] > https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router > > > > > ___ tor-relays mailing > list tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (MingW32) iQIcBAEBAgAGBQJUPmHuAAoJEE2uQiaesOsLAOMP/j8BHqO2yIHRV8Q7Ja3aYHrv ppLrDbjvbkV9paqGR4X8Gz71PJyHXZoOse6JfBxOnZG+mmoS9elYoXDkKoz8y5Z3 ot/cpoQdKLei+LvmRxQ5VHcwDXx6wb35+o7I5FnvMoyH2YTeqyfAmGnb5X7D3oa7 H5rYF8n17ttfvqHvFt2tRuZKKyskJWRnjnpkmmAJSeZpmZnRf38JGhdknmoPMXg3 5hwzh7E9xFSMM5NrCpXDYvRdZJMvQPWdDFOVUZvKMh/magJitfBZ2Lr7cpq2Vpep bU8Xs4z/a92j+bm3lN1jzUEgoxs7BEtn/bG2ASRJp2BufOFW8+FCTuOJQPVV0iSa BPtjoNGe1cwBin256ODF3GjcuzS0Vbql0oS3HyYyEgYEnDjXcw05sdd9tg9i1lqk 66M8h9/aQvZZX1qB4EPzweOYM10VX7mS2pGGl+00wGkGZvhZ4k5ixP/8kHQ7OqQh d6lwg/ZWK+6wYx3ADCKCvfD5pCNMlf4AtWgam3eQpSPw1uJuw3/twKEvuQijfhRM XyNu3GivErIpL1d9awm0tJdqcZYZsKw/RFKN9leHt8PhYTMcSp+MViPuFaPIcYh0 CHwj36gQTqB3XxzdnyJyzigwQhpWePs+qcmc4S3mTq8ogZsnBMgS080XocOx1Jrp zqZfg7sOGY+s3018nntK =SX0h -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Anonbox Project
Hi there, I recently read about the anonbox project [1], a small hardware-router, which allows end-users to connect their whole LAN to the Tor network. The project is on kickstarter at the moment [2]. Has there already been a discussion on how this might affect the performance of the Tor network? Regards, Sven. [1] http://anonabox.com [2] https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router -- PGP Key: https://0x80.io/pub/files/key.asc PGP Key Fingerprint: 2DF2 79CD 48DD 4D38 F0B6 7557 2E68 D557 49AA 1D99 Note: I'll be transitioning away from this key in the near future. signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays