Re: [tor-talk] geoip6

2013-04-12 Thread Justin Aplin

On 4/12/2013 2:09 AM, el...@riseup.net wrote:

Can someone tell me if I have to do something about geoip6 warnings?

I've got a bridge relay running from a vista x64 machine. As with the
past few TBB versions I'm still getting occasional message-log warnings:

Failed to open GEOIP file C:\Users\,acctname\AppData\Roaming
\tor\geoip6.


Geoip6 is simply a text list of the approximate physical address of IPv6 
addresses. Having this makes it easy to do things like display the 
locations of exits on a map (as Vidalia can do). It's not at all 
necessary for Tor to work properly, and won't affect either client or 
server function, but it's a nifty feature.



\AppData\Roaming\tor doesn't exist, nor does the subfolder
\geoip6, as I'm running the bridge from from TBB installed on a USB
stick. The installation seems correct, my geoip is in the data
directory as usual. As far as I can tell the bridge is connecting to
circuits as it should (though it's not carrying as much traffic as
previously).


If you like, you can grab geoip6 from [1] and save it in your data 
directory alongside geoip. If that doesn't fix the message, you can add 
the following line to your torrc:

GeoIPv6File \path\to\your\datadir\geoip6


I did find some discussion in bug tracker, but it's months old and
doesn't suggest anything that I can do.

So, do these warnings even apply to my relay installation? Can I
just ignore them?


Feel free to ignore them; the only thing that will happen is that IPv6 
exits won't show up on Vidalia's map. Traffic won't be affected in any way.


[1] https://gitweb.torproject.org/tor.git/blob_plain/HEAD:/src/config/geoip6

~Justin Aplin


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] secure and simple network time (hack)

2013-04-12 Thread Jacob Appelbaum
adrelanos:
 Why was tlsdate written in C?

There are a few reasons:

  The first prototype was in Python (patching tlslite)
however, I wanted it to be portable without patching libraries
  Jailing and/or sandboxing is easier without a system wide interpreter
eg: Python
  Droppings privileges is straight forward in C
  Setting capabilities is easier on a binary by binary basis
This is easily solved for say, Golang programs.
  I wanted to directly interface with many relevant libraries
   Currently it supports polarSSL and OpenSSL - patches welcome

C is a perfectly fine programming language - I've considered writing it
again in Golang. I may make a feature for feature compatible version at
some point in the future.

All the best,
Jacob
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Hi, does Nintendo block Tor. I can't reach Nintendo

2013-04-12 Thread Nate Homier
I run a relay on the same computer that I use to surf the web.  I run
into websites all the time that don't work because I think they block
Tor (so I don't do business with them).  So I'm asking can anyone else
access Nintendo from Tor.  My relay is MontanaBlueSky at 184.166.103.9.
 Try accessing Nintendo through my relay.

I need to get to Nintendo because my coins are going to expire in June.
 Can I use another non Tor proxy to access Nintendo?  Any ideas.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] NSA supercomputer

2013-04-12 Thread grarpamp
 infrastructure for supercomputing is immense, and very visible in the
 sense of taking up a lot of space as well as power requirements.
 Those facilities would stick out a country mile, and should be fairly
 easy to spot, leading to more focused speculation if nothing else.

 I read in a couple of articles that No Such Agency has their own chip
 foundry someplace.  It seems reasonable to wonder out loud if they do
 not have ASIC attacks against some cryptosystems (does anyone else
 remember Deep Crack?) implemented.  Perhaps all of the NSA's vaunted
 supercomputing power takes the form of racks and racks of servers with
 custom ASICs implementing those attacks instead of massively parallel
 architectures of general purpose computers running software attacks.

The US does now disclose the aggregate budgets for DoD, DHS, and
intel services under which NSA falls as a non line item. A search will
yield analyst estimates of the actual black amounts, etc. There's even
big wall posters for it all. No budget can exceed taxes plus international
revenues, various debt facilities and minus known expenses. It's not
Moonshot or war scale, nobody can afford that anymore without a
complete overhaul.

Yet a chip fab and unspottable underground facilities are entirely within
current means. To wit, The Mountain, Raven Rock, Utah DC, defuncts
such as Yucca, SSC, and so on. And implementing known attacks via
ASIC's where useful is common best practice these days.

It comes down to cost/benefit, business and rational guess. Figure out
where the state of the art lies (both commercial and estimates of advanced
black tech) for the budget, megawatts, floor space, die size, storage,
bandwidth, algorithms, attacks, hiring and education programs, history,
bit and clock efficiences, problems to solve, goals, etc. Within that answer
is where you will find the truth. At least as to capability, if not execution.
History shows there are always a few lucky gaping advances out there in
the world when compared to commercial tech. Whether the current ones
apply to anything people here care about is unknown. And unless you're
somehow an actor in that same high intrigue, you don't have anything to
worry about on an individual personal level [1] beyond the global and
national ramifications of it all.

[1] Any common criminal elements, what the dog ate for dinner, facebook,
etc. If you're trying to be the next WikiLeaks or political head, maybe
there's cause for worry? Maybe not? Tor tech is nice, being public has
it's advantages too.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Tails-dev] secure and simple network time (hack)

2013-04-12 Thread Matthew Finkel
I don't really understand your reservation about this project. It's reasonable
to want authenticated time to a non-webserver of ones choice. Depending on
your environment, tlsdate is complementary to the various other
programs. You can (and will) use whatever you decide fits your needs,
but please don't disparage a valid project because it segfaults after a
while. It's a work-in-progress, better to contribute useful information
than complain.

On Fri, Apr 12, 2013 at 02:43:13PM +0300, Maxim Kammerer wrote:
 On Fri, Jul 20, 2012 at 3:07 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
  Allow me to be very explicit: it is harder to parse an HTTP Date header
  than properly than casting a 32bit integer and flipping their order. The
  attack surface is very small and easy to audit.
 
 Just discovered that tlsdated in tlsdate-0.0.6 is dying with a
 segmentation fault after a while. Not surprised after seeing the code
 — my experimentation with this gimmick is finally over. Turns out that
 “throw something together and wait for patches” is not a sound
 development approach.
 
 --
 Maxim Kammerer
 Liberté Linux: http://dee.su/liberte
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Hi, does Nintendo block Tor. I can't reach Nintendo

2013-04-12 Thread Nate Homier
On 04/12/2013 11:33 AM, Nate Homier wrote:
 I run a relay on the same computer that I use to surf the web.  I run
 into websites all the time that don't work because I think they block
 Tor (so I don't do business with them).  So I'm asking can anyone else
 access Nintendo from Tor.  My relay is MontanaBlueSky at 184.166.103.9.
  Try accessing Nintendo through my relay.
 
 I need to get to Nintendo because my coins are going to expire in June.
  Can I use another non Tor proxy to access Nintendo?  Any ideas.

Never mind, the Nintendo website was just offline is all.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Mike Perry
Cool story bro.

We're worried about these things too, I guess.

I mean, if killing us all is really the best way to stop Tor, then I
would submit to you that Tor is unstoppable. After all, network
engineers are basically throwaway commodities to the mexican mafia:
http://www.wired.com/dangerroom/2012/11/zeta-radio/

I mean, if they kill their *own* codeslaves^Wemployees, what exactly do
you think murdering us will accomplish?

In the meantime, we have nothing to fear except fear itself. Oh, and
0day. Don't forget to ph34r the 0day. Turns out that shit costs way less
than high-profile assassination contracts (fortunately or unfortunately,
depending on your perspective :/).


P.S. If you're annoyed by this flippant response, it was given because
your rant is basically a long series of FAQs. There are ways to fix your
concerns but they require development effort, and in fact many of them
(including custom pluggable transports and private bridge distribution)
are already supported. For the others: Patches welcome.

P.P.S. I'll leave the point-by-point discussion to the other NSA thread
participants ;)

Thus spake Alex M (Coyo) (c...@darkdna.net):

 Is Tor ever going to include support for isolated, independent
 bridge relay communities that can host their own bridge directory
 authorities without relying on the centralized tor directory hosted
 by Peter Palfrader, Jacob Appelbaum and associates?
 
 From lurking here on the mailing lists and other places, Jacob and
 other core Tor staff and advocates generally seem to have a
 worryingly optimistic attitude toward the possibility of coordinated
 Tor censorship, crackdowns, network manipulation and attack,
 coordinated government raids upon Tor directory servers, or even
 assassinations against Jacob Appelbaum and other core staff and
 volunteers involved in the Tor project.
 
 Is it really so difficult to conceive of situations that involve
 violent raids against the datacenters hosting Tor directory servers
 and their mirrors, attacks, possibly physically violent, involving
 full military force against Jacob Appelbaum and other critical
 developers, staff, volunteers and advocates?
 
 You really think the governments of the industralized first world
 countries won't stoop that low?
 
 One day, they will accuse Jacob and the other core developers of
 being domestic terrorists or whatever as an excuse to fire upon
 native citizens on domestic soil.
 
 They will do it, one day.
 
 This is why providing relatively trivial means to deploy one's own
 bridge communities with many pluggable transports in order to
 prepare for that inevitability.
 
 The Bitcoin core developers and advocates will also be assassinated
 or eliminated militarily as well. It is inevitable.
 
 You really think our governments won't stoop that low? They are
 little more than pan-handling bums attempting to justify their jobs
 at the taxpayer's expense, and feel entitled to our money.
 
 Not only that, but they have the sheer unabashed chutzpa to presume
 they are legitimate in their entitlement, and have full authority to
 use our own taxpayer money against us, to enforce unjust laws, to
 inflict injustice against their own citizenry.
 
 If they have absolutely no compunction about shoving CISPA or SOPA
 down our throats, feel no remorse for warrantless wiretapping and
 unlawful deep packet inspection, or forcing internet service
 providers into spying on their own paying customers, what makes you
 think they won't slay Jacob Appelbaum where he stands?
 
 They will. They will, mark my words.
 
 And when that happens, we must be ready. Jacob's legacy needs to
 live on. Christian Fromme, Roger Dingledine, Nick Mathewson, Andrea
 Shepard, Dr. Paul Syverson..., their legacy must live on, regardless
 of whether the government shoves them against a cinderblock wall and
 shoots them dead where they stand.
 
 We must prepare for this inevitability. We need more pluggable
 transports, we need to break up the Tor relay network into distinct
 domains, we must make the tor relay network far more resilient to
 coordinated attacks, we need to decentralize the directory
 authorities and mitigate the horrifying damage in the event of
 directory authority compromise, and the subjugation and subversion
 of directory authorities, hidden services, user privacy and the
 physical safety of relay operators.
 
 We need far more stringent entry and exit guard node policies, more
 flexible and informative relay server statistics and circuit routing
 control.
 
 We need bridge relay communities with independent bridge directory
 authorities that can be run by semi-isolated communities, including
 bridge communities within other overlay networks such as private
 OpenVPN, CJDNS or AnoNet networks. As it is, if the Tor client
 cannot connect to the centralized high-value targets controlled by
 the Tor project team, Tor is absolutely worthless and useless.
 
 This must change. Tor should be usable by independent relay
 

Re: [tor-talk] Bridge Communities?

2013-04-12 Thread adrelanos
Hi Alex,

these are interesting thoughts. I wrote something related a while ago.

Tor: lobbies vs lobbies - Who will prevail?:
https://lists.torproject.org/pipermail/tor-talk/2012-August/025109.html

Alex M (Coyo):
 Is Tor ever going to include support for isolated, independent bridge
 relay communities that can host their own bridge directory authorities
 without relying on the centralized tor directory hosted by Peter
 Palfrader, Jacob Appelbaum and associates?

Good idea in general. (Although I don't share your reasons for it.)

 From lurking here on the mailing lists and other places, Jacob and other
 core Tor staff and advocates generally seem to have a worryingly
 optimistic attitude toward the possibility of coordinated Tor
 censorship, crackdowns, network manipulation and attack, coordinated
 government raids upon Tor directory servers,

I am interested, where did they say so?

 or even assassinations
 against Jacob Appelbaum and other core staff and volunteers involved in
 the Tor project.

Why assassinations? I've heard the some mafia style groups have a better
method than violence. They catch a child after school, make up some
Your parents told me to catch you today, I am your Uncle Sam. story,
aren't violent or threatening at all and go into some Disney land copy,
bring back the child afterwards. Not sure if that happens in reality,
but I am sure that works better than violence.

Other than that, it seems obvious to me that killing people isn't
effective as turning them around. Why wouldn't they rather use violence
to force them to put a backdoor into next Tor version?

As far I know no Tor developer has been harassed for Tor yet. (Please
tell me if I am wrong.) Jacob has been harassed like in a totalitarian
state because of his connections to wikileaks. I also wonder how Jacob
could stay so calm after all what happened to him, not being already a
broken man. I admire the Tor developers for doing their work in such a
dangerous country (US), knowing about waterbording and that stuff.

 Is it really so difficult to conceive of situations that involve violent
 raids against the datacenters hosting Tor directory servers and their
 mirrors, attacks, possibly physically violent, involving full military
 force against Jacob Appelbaum and other critical developers, staff,
 volunteers and advocates?

If that happens, that would be the worst case. I think without Tor
servers in the US and without the Tor developers, there is more Tor
network, since most Tor servers are in the US. Most other Tor servers
are in countries which the US can pressure as well. When the US decides
to take down Tor, it's pretty much over anyway.

 You really think the governments of the industralized first world
 countries won't stoop that low?

Maybe they don't have to. When I understood Jacob in his speeches right,
he doesn't believe that Tor does defeat the NSA. Why should they break
Tor if it's an open book already to them already anyway?

 One day, they will accuse Jacob and the other core developers of being
 domestic terrorists or whatever as an excuse to fire upon native
 citizens on domestic soil.

 They will do it, one day.

Only in case they can't easily break Tor already anyway.

 This is why providing relatively trivial means to deploy one's own
 bridge communities with many pluggable transports in order to prepare
 for that inevitability.

I don't see how that helps after hosting Tor servers has been made
illegal in US and most other countries.

 The Bitcoin core developers and advocates will also be assassinated or
 eliminated militarily as well. It is inevitable.

 You really think our governments won't stoop that low? They are little
 more than pan-handling bums attempting to justify their jobs at the
 taxpayer's expense, and feel entitled to our money.

 Not only that, but they have the sheer unabashed chutzpa to presume they
 are legitimate in their entitlement, and have full authority to use our
 own taxpayer money against us, to enforce unjust laws, to inflict
 injustice against their own citizenry.

 If they have absolutely no compunction about shoving CISPA or SOPA down
 our throats, feel no remorse for warrantless wiretapping and unlawful
 deep packet inspection, or forcing internet service providers into
 spying on their own paying customers,

Agreed.

 what makes you think they won't
 slay Jacob Appelbaum where he stands?

Answered above already.

 They will. They will, mark my words.
 
 And when that happens, we must be ready. Jacob's legacy needs to live
 on. Christian Fromme, Roger Dingledine, Nick Mathewson, Andrea Shepard,
 Dr. Paul Syverson..., their legacy must live on, regardless of whether
 the government shoves them against a cinderblock wall and shoots them
 dead where they stand.

As far I understand, Dr. Paul Syverson works for Naval Research
Laboratory and can be told to stop working on Tor and work for something
else instead.

The others, already covered that above.

 We must prepare for 

Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Griffin Boyce
Alex M (Coyo) c...@darkdna.net wrote:

 Is Tor ever going to include support for isolated, independent bridge
 relay communities that can host their own bridge directory authorities
 without relying on the centralized tor directory hosted by Peter Palfrader,
 Jacob Appelbaum and associates?



 Don't say I didn't warn you.


If anything, I would say that the Tor team tends to emphasize the absolute
worst-case scenarios.

There's really nothing keeping you from making a private bridge network.
 The documentation's all there.

best,
Griffin

-- 
Please note that I do not have PGP access at this time.
OTR: sa...@jabber.ccc.de / fonta...@jabber.ccc.de
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/12/2013 10:27 PM, Mike Perry wrote:

Cool story bro.


I know.



We're worried about these things too, I guess.


I believe it. I'm in the market for a bridge, if you'll sell one to me.



I mean, if killing us all is really the best way to stop Tor, then I
would submit to you that Tor is unstoppable. After all, network
engineers are basically throwaway commodities to the mexican mafia:
http://www.wired.com/dangerroom/2012/11/zeta-radio/

I mean, if they kill their*own*  codeslaves^Wemployees, what exactly do
you think murdering us will accomplish?


Well, killing us all wouldn't be necessary, just the core developers 
and the highest-profile advocates.


Minor contributors and patchers would be incapable of maintaining the 
project.


Still, the possibility is entirely within reason.



In the meantime, we have nothing to fear except fear itself. Oh, and
0day. Don't forget to ph34r the 0day. Turns out that shit costs way less
than high-profile assassination contracts (fortunately or unfortunately,
depending on your perspective :/).


Have you read about assassination markets? Are you familiar with that 
concept?


If you can use an anonymous assassination market to place bounties upon 
the heads of government officials, what makes you think they could not 
use the same systems to place bounties upon high-value activists?





P.S. If you're annoyed by this flippant response, it was given because
your rant is basically a long series of FAQs. There are ways to fix your
concerns but they require development effort, and in fact many of them
(including custom pluggable transports and private bridge distribution)
are already supported. For the others: Patches welcome.


I'm afraid I do not follow what you mean by FAQs since I do not see 
any overt interest (or developer consideration) concerning any of these 
features.


I have not seen any stable Tor client release notes announcing private 
bridge authority decentralization.


Did I misread something?



P.P.S. I'll leave the point-by-point discussion to the other NSA thread
participants;)


I'm sure there are many NSA employees here. Contributions to 
cryptography make NSA awesome, but that is dramatically balanced by NSA 
wiretapping. My opinion of the NSA is thus ambivalent.


Though that is off-topic.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/12/2013 10:37 PM, adrelanos wrote:

Hi Alex,

these are interesting thoughts. I wrote something related a while ago.

Tor: lobbies vs lobbies - Who will prevail?:
https://lists.torproject.org/pipermail/tor-talk/2012-August/025109.html

Alex M (Coyo):

Is Tor ever going to include support for isolated, independent bridge
relay communities that can host their own bridge directory authorities
without relying on the centralized tor directory hosted by Peter
Palfrader, Jacob Appelbaum and associates?

Good idea in general. (Although I don't share your reasons for it.)


What reasons would you have, then?


 From lurking here on the mailing lists and other places, Jacob and other
core Tor staff and advocates generally seem to have a worryingly
optimistic attitude toward the possibility of coordinated Tor
censorship, crackdowns, network manipulation and attack, coordinated
government raids upon Tor directory servers,

I am interested, where did they say so?


I am too tired and physically ill with an upper-respiratory infection to 
dig through mailing list archives at the moment.


If it is important that I shoulder the burden of proof, remind me later 
when I'm not coughing up blood.



or even assassinations
against Jacob Appelbaum and other core staff and volunteers involved in
the Tor project.

Why assassinations? I've heard the some mafia style groups have a better
method than violence. They catch a child after school, make up some
Your parents told me to catch you today, I am your Uncle Sam. story,
aren't violent or threatening at all and go into some Disney land copy,
bring back the child afterwards. Not sure if that happens in reality,
but I am sure that works better than violence.


I do not understand how taking a child to a theme park relates in any 
way to Jacob Appelbaum being tagged and bagged.


May I ask for a clarification here?



Other than that, it seems obvious to me that killing people isn't
effective as turning them around. Why wouldn't they rather use violence
to force them to put a backdoor into next Tor version?


That isn't quite as trivial as you make it sound, and really, it's 
unnecessary.


It is a general consensus that the united states federal government has 
full access to the directory authorities and majority of guard nodes and 
exit nodes within the united states.


It is a general consensus that the Tor network provides only illusory 
anonymity to any user hostile to united states military supremacy.


The Tor network is a historical toy created by the united states 
military, and is just as possessed and controlled by the united states 
military as it has been from day one.




As far I know no Tor developer has been harassed for Tor yet. (Please
tell me if I am wrong.) Jacob has been harassed like in a totalitarian
state because of his connections to wikileaks. I also wonder how Jacob
could stay so calm after all what happened to him, not being already a
broken man. I admire the Tor developers for doing their work in such a
dangerous country (US), knowing about waterbording and that stuff.


Is it really so difficult to conceive of situations that involve violent
raids against the datacenters hosting Tor directory servers and their
mirrors, attacks, possibly physically violent, involving full military
force against Jacob Appelbaum and other critical developers, staff,
volunteers and advocates?

If that happens, that would be the worst case. I think without Tor
servers in the US and without the Tor developers, there is more Tor
network, since most Tor servers are in the US. Most other Tor servers
are in countries which the US can pressure as well. When the US decides
to take down Tor, it's pretty much over anyway.


My point exactly.


You really think the governments of the industralized first world
countries won't stoop that low?

Maybe they don't have to. When I understood Jacob in his speeches right,
he doesn't believe that Tor does defeat the NSA. Why should they break
Tor if it's an open book already to them already anyway?


Tor is not designed (in its current form) to even attempt to contest NSA 
control and manipulation.



One day, they will accuse Jacob and the other core developers of being
domestic terrorists or whatever as an excuse to fire upon native
citizens on domestic soil.

They will do it, one day.

Only in case they can't easily break Tor already anyway.


Tor is already broken.

Services like The Hidden Wiki, Silk Road, and other high-profile hidden 
services are obviously honeypots and sting operations, since those 
hidden services would have been raided immediately abd their admins 
arrested without a court hearing or judicial oversight of any kind. Do 
no pass Go, do not collect 200 worthless united states dollars, go 
directly to Guantanamo Bay (or whatever the current replacement is).



This is why providing relatively trivial means to deploy one's own
bridge communities with many pluggable transports in order to prepare
for that 

Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Gregory Disney
I'm down to help with the rebuild.


On Sat, Apr 13, 2013 at 12:39 AM, Alex M (Coyo) c...@darkdna.net wrote:

 On 04/12/2013 11:01 PM, adrelanos wrote:

 Griffin Boyce:

 There's really nothing keeping you from making a private bridge network.
   The documentation's all there.

 Indeed. One can even make its own (private) Tor network. It will require
 a considerable amount of learning, though.

 It would be interesting to see several competing Tor networks. May or
 may not happen in long term future, if Tor can attract much more users
 and relays.

 Alex probable won't be up for creating an alternative Tor network with
 that threat model. As soon as you host a relay or directory authority,
 it's difficult (impossible?) to stay anonymous, you move yourself into
 the target line by doing so.


 With the current Tor network model, this is apparent.

 I might fork the Tor codebase and redesign the network from the ground up,
 and see what I can come up with.

 Should be interesting.

 Even if Tor cannot be salvaged, working with the traditional 3rd
 generation onion routing paradigm should be educational and instructive.

 __**_
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/**cgi-bin/mailman/listinfo/tor-**talkhttps://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/12/2013 11:01 PM, adrelanos wrote:

Griffin Boyce:

There's really nothing keeping you from making a private bridge network.
  The documentation's all there.

Indeed. One can even make its own (private) Tor network. It will require
a considerable amount of learning, though.

It would be interesting to see several competing Tor networks. May or
may not happen in long term future, if Tor can attract much more users
and relays.

Alex probable won't be up for creating an alternative Tor network with
that threat model. As soon as you host a relay or directory authority,
it's difficult (impossible?) to stay anonymous, you move yourself into
the target line by doing so.


It fills me with indescribable patriotism, nationalist love for my 
country, the heartland, home of the free.


My experiences with tor imply the child porn archives, the silk road and 
other drug exchange markets, the hackbb and other cracker/carder 
communities and other high-profile hidden services (eepsites) are all 
implicitly honeypot sting operations run by the united states military 
and federal agencies.


My country is constantly vigilant, and protects us from all the evil 
drug-addled hippies, perverted child-lovers, dangerous cyberterrorists 
and other dissident intellectuals quietly preparing for countless acts 
of domestic terrorism and treason against my beloved country and her 
rightful representatives and public servants.


I love my country, I love my federal and state governments, and I have 
complete faith in the competency, legitimacy, authority and moral 
superiority of my beloved country's representatives and public servants.


I love how my country looks after us all like a doting father, 
performing deep packet inspection, email, sms text, phone call and skype 
message interception like a responsible and watchful father over his 
children.


I love how my country obviously knows what's best for me, my family, my 
friends, my community, and fellow citizens and is stern but fair, 
disciplining us when we misbehave and rewarding us when we behave like 
model citizens.


I love how my country promises that if I have nothing to hide, I have 
nothing to fear but fear itself.


My country is obviously the best, hands down.

:P
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Mike Perry
Thus spake Alex M (Coyo) (c...@darkdna.net):

 P.S. If you're annoyed by this flippant response, it was given because
 your rant is basically a long series of FAQs. There are ways to fix your
 concerns but they require development effort, and in fact many of them
 (including custom pluggable transports and private bridge distribution)
 are already supported. For the others: Patches welcome.
 
 I'm afraid I do not follow what you mean by FAQs since I do not
 see any overt interest (or developer consideration) concerning any
 of these features.

If you have a specific list of design flaws that aren't couched in long
rants, we can perhaps help instruct you on how you might solve them in
your redesign with Mr Disney, or at least point you toward some tickets
you two should read and follow during that process.

Otherwise, thanks for your concern/veiled threats/trolling.

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/13/2013 12:13 AM, Mike Perry wrote:

Otherwise, thanks for your concern/veiled threats/trolling.


Because obviously criticism and actual concern for the well-being of a 
foss project is always trolling and threats.


I hope you aren't a contributor.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/13/2013 12:13 AM, Mike Perry wrote:
If you have a specific list of design flaws that aren't couched in 
long rants, we can perhaps help instruct you on how you might solve 
them in your redesign with Mr Disney, or at least point you toward 
some tickets you two should read and follow during that process. 
Otherwise, thanks for your concern/veiled threats/trolling.


Though, with that attitude of yours, I'm afraid I'm uninterested in any 
assistance you may deign to bestow upon Gregory Disney and I.


I'm confident we can do just fine without your arrogance.

Obviously, your selfless concern for your userbase knows no bounds.

It concerns me that you refer to we as though you contribute anything 
to the tor project.


I'm sure the tor coders are going to be more than happy to support the 
foss ideals in this case in regards to codebase forking rights.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk