Re: [tor-talk] Bridge Communities?

2013-04-14 Thread Alex M (Coyo)

On 04/13/2013 12:14 PM, grarpamp wrote:

I mean, most overlays out there are NOT for anonymity

Not for strong anonymity at least. Many are closes source windows blobs
and generally weighted towards filesharing and vague vpn privacy claims.
Those are definitely the ones to avoid. If you can't see and change the code
it's not worth one bit of your time beyond cataloging it's 'features'
for possible
reimplementation.


To be honest, I do that all of the time. I have reverse engineered skype 
to a certain extent and run massive clusters of virtual machines and 
virtual networks to reverse engineer the behavior of the skype network, 
and have very VERY heavily studied the skype api, all versions of it.


i did this with the sole purpose of taking the good ideas, concepts and 
features from it for purposes of planning on a new network, 
reimplementing the features i like, and cherry picking from HUNDREDS of 
other protocols and network models for my own overlay project.


In case you were wondering, the project is named Fennec, and I have not 
yet published a git repository for it, yet. I'm not ready.





Sure, i2P exists, but who wants to spin up a huge honking java virtual
machine just to participate in that relay pool?

It's actually pretty easy and can run on modest hardware as a node.


Maybe so, but I personally prefer keeping java off my machines in any form.




Not only that, but i2P (last I checked) does not support IPv6 Eepsites,
while Tor is (slowly) getting to that point.

Neither do, and neither are. You can shim both with onioncat to
some caveated win.


I must have been misinformed. I know you can do it (in theory) with 
netcat or some other tunneling mechanism, such as tinc or quicktun vpns, 
but that's not a real solution.


I had not heard of onioncat.




IPv6 eepsites/hidden services is an important feature to me.

Absolutely.


GNUnet or even more obscure overlays do not have stable featuresets
regarding generic unmodified TCP or UDP services, be it over IPv4 or IPv6.

Phantom does this completely already, but is even more obscure.


I have heard of phantom, but I thought it was no longer actively 
developed, and had not been actively developed for years. Has it be 
quietly forked and developed somewhere I don't know about?





Sure GNUnet has IPv6 private VPNs on the eventual roadmap, and sure you
could extend that to virtual interfaces, and sure you could enable linux or
whatever to act as a router between those interfaces, you could even enable
Quagga or whatever to swap an (alternative) BGP peering table, but GNUnet
has a lot of other priorities, and isn't likely to get around to that

On the IPv6 interop front, the only thing these projects need to code
is unique address in specific /48 bound to an IPv6 interface and mapped
to internal 80bit address [sub]space for transport. User will setup all those
interconnects. There are projects in the works...


That would be cool. Too bad I can't code C.

Though, some coder and engie friends of mine are talking about 
kidnapping me from home and tying me up and forcing me to learn C or 
suffer the consequences.


These consequences are not safe for work, so I will spare your sanity.

This time. :)
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Griffin Boyce
Alex M (Coyo) c...@darkdna.net wrote:

 I must have somehow missed it.

 I would really appreciate a link. I cannot seem to find it on my own.

 Thank you in advance.


 Here are the common ways: roll a bunch of bridges using Amazon's cloud
[1], have friends/allies/interesting frenemies run bridges using Vidalia
[2], or just use a garden-variety VPN/proxy before entering the Tor network.

~Griffin

[1] https://cloud.torproject.org/
[2] https://www.torproject.org/download/download.html.en

-- 
Please note that I do not have PGP access at this time.
OTR: sa...@jabber.ccc.de / fonta...@jabber.ccc.de
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Mike Perry
Thus spake Seth David Schoen (sch...@eff.org):

 Alex M (Coyo) writes:
 
  It concerns me that you [Mike Perry] refer to we as though you
  contribute anything to the tor project.
 
 https://gitweb.torproject.org/
 https://www.torproject.org/torbutton/en/design/index.html.en
 https://www.torproject.org/projects/torbrowser/design/
 https://gitweb.torproject.org/https-everywhere.git/blob/HEAD:/src/chrome/content/about.xul

No no dude don't do that! Now they know why they should kill me!

Aww fuck it.

Well, if anyone asks why I died, the official answer is now that it was
totally the fault of doubleclick.net (or their current majority
shareholder ;).

P.S. Thanks, Seth. ;)

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Alex M (Coyo)

On 04/13/2013 01:29 AM, Mike Perry wrote:

Thus spake Alex M (Coyo) (c...@darkdna.net):


On 04/13/2013 12:13 AM, Mike Perry wrote:

If you have a specific list of design flaws that aren't couched in
long rants, we can perhaps help instruct you on how you might
solve them in your redesign with Mr Disney, or at least point you
toward some tickets you two should read and follow during that
process. Otherwise, thanks for your concern/veiled
threats/trolling.

Though, with that attitude of yours, I'm afraid I'm uninterested in
any assistance you may deign to bestow upon Gregory Disney and I.

I'm confident we can do just fine without your arrogance.

Ooh. A flame war. I love these. *Boop* I just took your nose over
TCP/IP.


You wish.


It concerns me that you refer to we as though you contribute
anything to the tor project.

It's called solidarity. I won't stand idly by while you suggest that Tor
developers and relay volunteers could be murdered or threatened to
sabotage our project. As if such tactics would even work without
someone instantly running to EFF/ACLU or proposing a design change...


I wonder why you insist on claiming that I intend to murder coders and 
activists?


It's not like you're going to spark an investigation.

Dream on.



Perhaps I'm just annoyed you didn't include my name among the death
threats in your first rant.

Now you know better, I hope.


Protip: It's because you don't matter.

At all.


I'm sure the tor coders are going to be more than happy to support
the foss ideals in this case in regards to codebase forking rights.

Dude, the source code is BSD/MIT licensed. Sell binaries with your own
secret sauce to others if you wish. We don't care. Just don't tell
people you're giving them Tor.


P.S. Cite your specific design concerns or this is my last reply to you
on this list. (I totally promise.. Flame wars are bd... Mmmkay?)


FYI: This is my I totally care about what you have to say face. :P
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Alex M (Coyo)

On 04/13/2013 01:54 AM, Griffin Boyce wrote:

Alex M (Coyo)c...@darkdna.net  wrote:


I must have somehow missed it.

I would really appreciate a link. I cannot seem to find it on my own.

Thank you in advance.

  Here are the common ways: roll a bunch of bridges using Amazon's cloud
[1], have friends/allies/interesting frenemies run bridges using Vidalia
[2], or just use a garden-variety VPN/proxy before entering the Tor network.

~Griffin

[1]https://cloud.torproject.org/
[2]https://www.torproject.org/download/download.html.en


That is extremely unhelpful.

Merely running bridges on a huge ridiculously insecure public cloud does 
not equal running bridge authorities independent of the bridge authority 
run by the tor project.


I have still not gotten a straight answer about whether or not the 
bridge community featureset has been released in the stable tor client.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Moritz Bartl
On 13.04.2013 04:30, Alex M (Coyo) wrote:
 Is Tor ever going to include support for isolated, independent bridge
 relay communities that can host their own bridge directory authorities

I'm working on setting up (yet) another non-profit organization with
limited liability in Germany (gGmbH). Over time, the goal is for it to
become a European Tor. One of its projects will be torservers.net, and
torservers.net is an independent network of organizations that run Tor
exits and Tor bridges in larger scale. For that entity, it would be easy
to run a bridge authority, and I will look into how to do this properly
as soon as (a) the paperwork is done and (b) time permits and (c)
funding is on the horizon.

If anyone wants to help, just do it! :) We're happy about every hand we
can get.

-- 
Moritz Bartl
https://www.torservers.net/
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread adrelanos
Alex M (Coyo):
 I have still not gotten a straight answer about whether or not the
 bridge community featureset has been released in the stable tor client.

It's all in there.

https://www.torproject.org/docs/tor-manual.html.en

AlternateBridgeAuthority [nickname] [flags] address:port fingerprint

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread adrelanos
Alex M (Coyo):
 On 04/13/2013 12:13 AM, Mike Perry wrote:
 Otherwise, thanks for your concern/veiled threats/trolling.
 
 Because obviously criticism and actual concern for the well-being of a
 foss project is always trolling and threats.
 
 I hope you aren't a contributor.

See https://www.torproject.org/about/corepeople.html.en
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Griffin Boyce
Alex M (Coyo) c...@darkdna.net wrote:

 On 04/13/2013 01:54 AM, Griffin Boyce wrote:

   Here are the common ways: roll a bunch of bridges using Amazon's cloud
 [1], have friends/allies/interesting frenemies run bridges using Vidalia
 [2], or just use a garden-variety VPN/proxy before entering the Tor
 network.

 ~Griffin

 [1]https://cloud.torproject.**org/ https://cloud.torproject.org/
 [2]https://www.torproject.org/**download/download.html.enhttps://www.torproject.org/download/download.html.en


 That is extremely unhelpful.

 Merely running bridges on a huge ridiculously insecure public cloud does
 not equal running bridge authorities independent of the bridge authority
 run by the tor project.

 I have still not gotten a straight answer about whether or not the bridge
 community featureset has been released in the stable tor client.


  The answer to your second question is no, because private bridges are
used in a setting where heavy censorship exists (eg, China), very few
people want to expose their private bridge networks to outsiders like
yourself. People frequently roll a set of bridges *for their own use*.

  Of course, if you truly have a problem with the Tor network, you're not
obligated to use it. =P  Other options still exist for a reason.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread adrelanos
Alex M (Coyo):
 On 04/12/2013 10:37 PM, adrelanos wrote:
 Hi Alex,

 these are interesting thoughts. I wrote something related a while ago.

 Tor: lobbies vs lobbies - Who will prevail?:
 https://lists.torproject.org/pipermail/tor-talk/2012-August/025109.html

 Alex M (Coyo):
 Is Tor ever going to include support for isolated, independent bridge
 relay communities that can host their own bridge directory authorities
 without relying on the centralized tor directory hosted by Peter
 Palfrader, Jacob Appelbaum and associates?
 Good idea in general. (Although I don't share your reasons for it.)
 
 What reasons would you have, then?

Competition and more people involved always pushes projects forward faster.

  From lurking here on the mailing lists and other places, Jacob and
 other
 core Tor staff and advocates generally seem to have a worryingly
 optimistic attitude toward the possibility of coordinated Tor
 censorship, crackdowns, network manipulation and attack, coordinated
 government raids upon Tor directory servers,
 I am interested, where did they say so?
 
 I am too tired and physically ill with an upper-respiratory infection to
 dig through mailing list archives at the moment.
 
 If it is important that I shoulder the burden of proof, remind me later
 when I'm not coughing up blood.

Keep your time.

 or even assassinations
 against Jacob Appelbaum and other core staff and volunteers involved in
 the Tor project.
 Why assassinations? I've heard the some mafia style groups have a better
 method than violence. They catch a child after school, make up some
 Your parents told me to catch you today, I am your Uncle Sam. story,
 aren't violent or threatening at all and go into some Disney land copy,
 bring back the child afterwards. Not sure if that happens in reality,
 but I am sure that works better than violence.
 
 May I ask for a clarification here?

Yes.

 I do not understand how taking a child to a theme park relates in any
 way to Jacob Appelbaum being tagged and bagged.

I don't know if Jacob has children and it's none of my business. Instead
of mentally breaking a mastermind like Jacob, they rather threaten it's
loved ones to make him stop working what he is working on it or to make
him even working for them.


 Other than that, it seems obvious to me that killing people isn't
 effective as turning them around. Why wouldn't they rather use violence
 to force them to put a backdoor into next Tor version?
 
 That isn't quite as trivial as you make it sound, and really, it's
 unnecessary.

Why it's not simple? It's well inside their budget.

 It is a general consensus that the united states federal government has
 full access to the directory authorities and majority of guard nodes and
 exit nodes within the united states.

 It is a general consensus that the Tor network provides only illusory
 anonymity to any user hostile to united states military supremacy.
 
 The Tor network is a historical toy created by the united states
 military, and is just as possessed and controlled by the united states
 military as it has been from day one.

Let's assume that's true - no danger for Tor core people from the US.

What about other countries? Tor gives network access to many people in
countries who censor Tor. Couldn't they get totally mad if their
technical fight fails and switch over to a secret service violent operating?


 As far I know no Tor developer has been harassed for Tor yet. (Please
 tell me if I am wrong.) Jacob has been harassed like in a totalitarian
 state because of his connections to wikileaks. I also wonder how Jacob
 could stay so calm after all what happened to him, not being already a
 broken man. I admire the Tor developers for doing their work in such a
 dangerous country (US), knowing about waterbording and that stuff.

 Is it really so difficult to conceive of situations that involve violent
 raids against the datacenters hosting Tor directory servers and their
 mirrors, attacks, possibly physically violent, involving full military
 force against Jacob Appelbaum and other critical developers, staff,
 volunteers and advocates?
 If that happens, that would be the worst case. I think without Tor
 servers in the US and without the Tor developers, there is more Tor
 network, since most Tor servers are in the US. Most other Tor servers
 are in countries which the US can pressure as well. When the US decides
 to take down Tor, it's pretty much over anyway.
 
 My point exactly.

 You really think the governments of the industralized first world
 countries won't stoop that low?
 Maybe they don't have to. When I understood Jacob in his speeches right,
 he doesn't believe that Tor does defeat the NSA. Why should they break
 Tor if it's an open book already to them already anyway?
 
 Tor is not designed (in its current form) to even attempt to contest NSA
 control and manipulation.
 
 One day, they will accuse Jacob and the other core developers of being
 domestic terrorists or whatever as 

Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Alex M (Coyo)

I think you're right.


On 04/13/2013 04:32 AM, Gregory Disney wrote:

OnionCat? Anything more extreme than that is going to have be built from
the ground up.


On Sat, Apr 13, 2013 at 5:20 AM, Alex M (Coyo) c...@darkdna.net wrote:


On 04/13/2013 01:54 AM, Griffin Boyce wrote:


Alex M (Coyo)c...@darkdna.net  wrote:

  I must have somehow missed it.

I would really appreciate a link. I cannot seem to find it on my own.

Thank you in advance.

   Here are the common ways: roll a bunch of bridges using Amazon's cloud
[1], have friends/allies/interesting frenemies run bridges using Vidalia
[2], or just use a garden-variety VPN/proxy before entering the Tor
network.

~Griffin

[1]https://cloud.torproject.**org/ https://cloud.torproject.org/
[2]https://www.torproject.org/**download/download.html.enhttps://www.torproject.org/download/download.html.en


That is extremely unhelpful.

Merely running bridges on a huge ridiculously insecure public cloud does
not equal running bridge authorities independent of the bridge authority
run by the tor project.

I have still not gotten a straight answer about whether or not the bridge
community featureset has been released in the stable tor client.


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Alex M (Coyo)

On 04/13/2013 10:27 AM, adrelanos wrote:

Alex M (Coyo):

I have still not gotten a straight answer about whether or not the
bridge community featureset has been released in the stable tor client.

It's all in there.

https://www.torproject.org/docs/tor-manual.html.en

AlternateBridgeAuthority [nickname] [flags] address:port fingerprint


Oh, wow!

That's new!

Good job, guys!

How the heck did I miss that? I must have read that manual a hundred 
times, but I've never noted that particular command!


Durp!
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Alex M (Coyo)

On 04/13/2013 10:29 AM, adrelanos wrote:

Alex M (Coyo):

On 04/13/2013 12:13 AM, Mike Perry wrote:

Otherwise, thanks for your concern/veiled threats/trolling.

Because obviously criticism and actual concern for the well-being of a
foss project is always trolling and threats.

I hope you aren't a contributor.

See https://www.torproject.org/about/corepeople.html.en


I just got done rea-- OMFG, that dick is in there.

lol TorButton and performance metrics.

No wonder I missed his name.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Alex M (Coyo)

On 04/13/2013 10:35 AM, Griffin Boyce wrote:

Alex M (Coyo) c...@darkdna.net wrote:


On 04/13/2013 01:54 AM, Griffin Boyce wrote:

   Here are the common ways: roll a bunch of bridges using Amazon's cloud
[1], have friends/allies/interesting frenemies run bridges using Vidalia
[2], or just use a garden-variety VPN/proxy before entering the Tor
network.

~Griffin

[1]https://cloud.torproject.**org/ https://cloud.torproject.org/
[2]https://www.torproject.org/**download/download.html.enhttps://www.torproject.org/download/download.html.en


That is extremely unhelpful.

Merely running bridges on a huge ridiculously insecure public cloud does
not equal running bridge authorities independent of the bridge authority
run by the tor project.

I have still not gotten a straight answer about whether or not the bridge
community featureset has been released in the stable tor client.


   The answer to your second question is no, because private bridges are
used in a setting where heavy censorship exists (eg, China), very few
people want to expose their private bridge networks to outsiders like
yourself. People frequently roll a set of bridges *for their own use*.


Someone quoted the Tor manual, and noted that one of the options is:

AlternateBridgeAuthority [nickname] [flags] address:port fingerprint

That sounds a lot more like I'm looking for.

All I need is patch an AlternativeDirectoryAuthority option, and there you 
go. :D





   Of course, if you truly have a problem with the Tor network, you're not
obligated to use it. =P  Other options still exist for a reason.


Not very many!

I mean, most overlays out there are NOT for anonymity, and they do NOT 
offer an equivalent featureset to Tor hidden services.


Sure, i2P exists, but who wants to spin up a huge honking java virtual 
machine just to participate in that relay pool?


Not only that, but i2P (last I checked) does not support IPv6 Eepsites, 
while Tor is (slowly) getting to that point.


IPv6 eepsites/hidden services is an important feature to me.

GNUnet or even more obscure overlays do not have stable featuresets 
regarding generic unmodified TCP or UDP services, be it over IPv4 or IPv6.


Sure GNUnet has IPv6 private VPNs on the eventual roadmap, and sure you 
could extend that to virtual interfaces, and sure you could enable linux 
or whatever to act as a router between those interfaces, you could even 
enable Quagga or whatever to swap an (alternative) BGP peering table, 
but GNUnet has a lot of other priorities, and isn't likely to get around 
to that anytime within the next two decades.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Eugen Leitl
On Sat, Apr 13, 2013 at 01:14:16PM -0400, grarpamp wrote:

  Sure, i2P exists, but who wants to spin up a huge honking java virtual
  machine just to participate in that relay pool?
 
 It's actually pretty easy and can run on modest hardware as a node.

I disagree about modest hardware. Anything Java (Freenet, ip2, etc.)
reliably craps out after a few weeks of operation on lean but usable
hardware (~2 GBytes RAM effectively, dual-core Atom). It's okay
for fat desktops which run for maybe a few weeks. 

Anything Java in general makes me a sad panda.
 
  Not only that, but i2P (last I checked) does not support IPv6 Eepsites,
  while Tor is (slowly) getting to that point.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Mike Perry
Thus spake grarpamp (grarp...@gmail.com):

  It concerns me that you [Mike Perry] refer to we as though you
  contribute anything to the tor project.
 
 Mike does a good deal of fine work for the Tor project.
 And I'm happy to see the torbrowser project come in place
 with as part goal of working with Mozilla to finally upstream
 fix FF for benefit of native FF users worldwide. Much better
 long term approach than torbutton.

While I appreciate people standing up for me, there's not really much
need to defend me to a drama queen who can't be bothered to RTFM before
suggesting features, and moreover who thinks that suggesting specific
people will be murdered is the right way to contribute to a FOSS project
or ensure the prioritization of their desired features.

I mean, I had more than a few lullz patiently toying with this idiocy
waiting for the doxx to drop (so to speak), that's for sure ;).

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-13 Thread Gregory Disney
Let's not dread on things out of our control; IMO we should use these
concerns to develop solutions then turn them into soultions that we can
implement. Obviously we can't develop around assassinations nor state
funded terrorism, but we can develop a solution for  backdoors
and information leaks.




On Sat, Apr 13, 2013 at 10:15 PM, adrelanos adrela...@riseup.net wrote:

 Sebastian G. bastik.tor:
  (Fun part?)

 Not a fun part for me. It's sad that these concern have been raised by
 a troll (or someone who doesn't know how to behave). However, these
 concerns are valid, and from my perspective, I can't understand why
 they are easily dismissed.

  About assassinating (double ass) the (core?) Tor people
 
  I have read that you can hire assassins on hidden-services.
  Wouldn't it be ironic if one hires an assassin (or many of them)
  via hidden-services to take the lives or Tor people?
 
  They tend to pile up on something they call developers meeting
  (aka DevMeeting). It's kind of public when and where such a
  meetings will take place and who will attend to them.
 
  The US owns drones (and they love to use them), European states buy
  also drones so if someone gets accused for treason, which is
  probably Mr. Jacob Appelbaum because of his relation to wikileaks,
  while Tor is also a threat such a meeting would be a juicy target.
  With someone killed for treason or terrorism (or supporting it) the
  other dead bodies are just collateral damage.
 
  That doesn't scare me.

 It scares me.

  I'd never want that to happen.

 Me neither.

  If it doesn't look like an accident (in this case or any other)
  people will notice about them missing or being killed. I hope that
  people will fight murders.
 
  Tor might be dead, but people will be upset about the death of
  innocent people.

 Yes, people will be upset, too few to see things change. People
 tortured in Guantanamo, Bradley Manning, list goes on... go through
 things which are worse than death.

  What's more concerning is that they could back-door Tor, all it
  takes is to turn one developer around, let anyone know about the
  back-door and people will loose trust.

 Yes.

  That could kill Tor as well.

 Or people who could help will finally help pushing the deterministic
 build feature. Often a fail finally helps to make a change.
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Mike Perry
Cool story bro.

We're worried about these things too, I guess.

I mean, if killing us all is really the best way to stop Tor, then I
would submit to you that Tor is unstoppable. After all, network
engineers are basically throwaway commodities to the mexican mafia:
http://www.wired.com/dangerroom/2012/11/zeta-radio/

I mean, if they kill their *own* codeslaves^Wemployees, what exactly do
you think murdering us will accomplish?

In the meantime, we have nothing to fear except fear itself. Oh, and
0day. Don't forget to ph34r the 0day. Turns out that shit costs way less
than high-profile assassination contracts (fortunately or unfortunately,
depending on your perspective :/).


P.S. If you're annoyed by this flippant response, it was given because
your rant is basically a long series of FAQs. There are ways to fix your
concerns but they require development effort, and in fact many of them
(including custom pluggable transports and private bridge distribution)
are already supported. For the others: Patches welcome.

P.P.S. I'll leave the point-by-point discussion to the other NSA thread
participants ;)

Thus spake Alex M (Coyo) (c...@darkdna.net):

 Is Tor ever going to include support for isolated, independent
 bridge relay communities that can host their own bridge directory
 authorities without relying on the centralized tor directory hosted
 by Peter Palfrader, Jacob Appelbaum and associates?
 
 From lurking here on the mailing lists and other places, Jacob and
 other core Tor staff and advocates generally seem to have a
 worryingly optimistic attitude toward the possibility of coordinated
 Tor censorship, crackdowns, network manipulation and attack,
 coordinated government raids upon Tor directory servers, or even
 assassinations against Jacob Appelbaum and other core staff and
 volunteers involved in the Tor project.
 
 Is it really so difficult to conceive of situations that involve
 violent raids against the datacenters hosting Tor directory servers
 and their mirrors, attacks, possibly physically violent, involving
 full military force against Jacob Appelbaum and other critical
 developers, staff, volunteers and advocates?
 
 You really think the governments of the industralized first world
 countries won't stoop that low?
 
 One day, they will accuse Jacob and the other core developers of
 being domestic terrorists or whatever as an excuse to fire upon
 native citizens on domestic soil.
 
 They will do it, one day.
 
 This is why providing relatively trivial means to deploy one's own
 bridge communities with many pluggable transports in order to
 prepare for that inevitability.
 
 The Bitcoin core developers and advocates will also be assassinated
 or eliminated militarily as well. It is inevitable.
 
 You really think our governments won't stoop that low? They are
 little more than pan-handling bums attempting to justify their jobs
 at the taxpayer's expense, and feel entitled to our money.
 
 Not only that, but they have the sheer unabashed chutzpa to presume
 they are legitimate in their entitlement, and have full authority to
 use our own taxpayer money against us, to enforce unjust laws, to
 inflict injustice against their own citizenry.
 
 If they have absolutely no compunction about shoving CISPA or SOPA
 down our throats, feel no remorse for warrantless wiretapping and
 unlawful deep packet inspection, or forcing internet service
 providers into spying on their own paying customers, what makes you
 think they won't slay Jacob Appelbaum where he stands?
 
 They will. They will, mark my words.
 
 And when that happens, we must be ready. Jacob's legacy needs to
 live on. Christian Fromme, Roger Dingledine, Nick Mathewson, Andrea
 Shepard, Dr. Paul Syverson..., their legacy must live on, regardless
 of whether the government shoves them against a cinderblock wall and
 shoots them dead where they stand.
 
 We must prepare for this inevitability. We need more pluggable
 transports, we need to break up the Tor relay network into distinct
 domains, we must make the tor relay network far more resilient to
 coordinated attacks, we need to decentralize the directory
 authorities and mitigate the horrifying damage in the event of
 directory authority compromise, and the subjugation and subversion
 of directory authorities, hidden services, user privacy and the
 physical safety of relay operators.
 
 We need far more stringent entry and exit guard node policies, more
 flexible and informative relay server statistics and circuit routing
 control.
 
 We need bridge relay communities with independent bridge directory
 authorities that can be run by semi-isolated communities, including
 bridge communities within other overlay networks such as private
 OpenVPN, CJDNS or AnoNet networks. As it is, if the Tor client
 cannot connect to the centralized high-value targets controlled by
 the Tor project team, Tor is absolutely worthless and useless.
 
 This must change. Tor should be usable by independent relay
 

Re: [tor-talk] Bridge Communities?

2013-04-12 Thread adrelanos
Hi Alex,

these are interesting thoughts. I wrote something related a while ago.

Tor: lobbies vs lobbies - Who will prevail?:
https://lists.torproject.org/pipermail/tor-talk/2012-August/025109.html

Alex M (Coyo):
 Is Tor ever going to include support for isolated, independent bridge
 relay communities that can host their own bridge directory authorities
 without relying on the centralized tor directory hosted by Peter
 Palfrader, Jacob Appelbaum and associates?

Good idea in general. (Although I don't share your reasons for it.)

 From lurking here on the mailing lists and other places, Jacob and other
 core Tor staff and advocates generally seem to have a worryingly
 optimistic attitude toward the possibility of coordinated Tor
 censorship, crackdowns, network manipulation and attack, coordinated
 government raids upon Tor directory servers,

I am interested, where did they say so?

 or even assassinations
 against Jacob Appelbaum and other core staff and volunteers involved in
 the Tor project.

Why assassinations? I've heard the some mafia style groups have a better
method than violence. They catch a child after school, make up some
Your parents told me to catch you today, I am your Uncle Sam. story,
aren't violent or threatening at all and go into some Disney land copy,
bring back the child afterwards. Not sure if that happens in reality,
but I am sure that works better than violence.

Other than that, it seems obvious to me that killing people isn't
effective as turning them around. Why wouldn't they rather use violence
to force them to put a backdoor into next Tor version?

As far I know no Tor developer has been harassed for Tor yet. (Please
tell me if I am wrong.) Jacob has been harassed like in a totalitarian
state because of his connections to wikileaks. I also wonder how Jacob
could stay so calm after all what happened to him, not being already a
broken man. I admire the Tor developers for doing their work in such a
dangerous country (US), knowing about waterbording and that stuff.

 Is it really so difficult to conceive of situations that involve violent
 raids against the datacenters hosting Tor directory servers and their
 mirrors, attacks, possibly physically violent, involving full military
 force against Jacob Appelbaum and other critical developers, staff,
 volunteers and advocates?

If that happens, that would be the worst case. I think without Tor
servers in the US and without the Tor developers, there is more Tor
network, since most Tor servers are in the US. Most other Tor servers
are in countries which the US can pressure as well. When the US decides
to take down Tor, it's pretty much over anyway.

 You really think the governments of the industralized first world
 countries won't stoop that low?

Maybe they don't have to. When I understood Jacob in his speeches right,
he doesn't believe that Tor does defeat the NSA. Why should they break
Tor if it's an open book already to them already anyway?

 One day, they will accuse Jacob and the other core developers of being
 domestic terrorists or whatever as an excuse to fire upon native
 citizens on domestic soil.

 They will do it, one day.

Only in case they can't easily break Tor already anyway.

 This is why providing relatively trivial means to deploy one's own
 bridge communities with many pluggable transports in order to prepare
 for that inevitability.

I don't see how that helps after hosting Tor servers has been made
illegal in US and most other countries.

 The Bitcoin core developers and advocates will also be assassinated or
 eliminated militarily as well. It is inevitable.

 You really think our governments won't stoop that low? They are little
 more than pan-handling bums attempting to justify their jobs at the
 taxpayer's expense, and feel entitled to our money.

 Not only that, but they have the sheer unabashed chutzpa to presume they
 are legitimate in their entitlement, and have full authority to use our
 own taxpayer money against us, to enforce unjust laws, to inflict
 injustice against their own citizenry.

 If they have absolutely no compunction about shoving CISPA or SOPA down
 our throats, feel no remorse for warrantless wiretapping and unlawful
 deep packet inspection, or forcing internet service providers into
 spying on their own paying customers,

Agreed.

 what makes you think they won't
 slay Jacob Appelbaum where he stands?

Answered above already.

 They will. They will, mark my words.
 
 And when that happens, we must be ready. Jacob's legacy needs to live
 on. Christian Fromme, Roger Dingledine, Nick Mathewson, Andrea Shepard,
 Dr. Paul Syverson..., their legacy must live on, regardless of whether
 the government shoves them against a cinderblock wall and shoots them
 dead where they stand.

As far I understand, Dr. Paul Syverson works for Naval Research
Laboratory and can be told to stop working on Tor and work for something
else instead.

The others, already covered that above.

 We must prepare for 

Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Griffin Boyce
Alex M (Coyo) c...@darkdna.net wrote:

 Is Tor ever going to include support for isolated, independent bridge
 relay communities that can host their own bridge directory authorities
 without relying on the centralized tor directory hosted by Peter Palfrader,
 Jacob Appelbaum and associates?



 Don't say I didn't warn you.


If anything, I would say that the Tor team tends to emphasize the absolute
worst-case scenarios.

There's really nothing keeping you from making a private bridge network.
 The documentation's all there.

best,
Griffin

-- 
Please note that I do not have PGP access at this time.
OTR: sa...@jabber.ccc.de / fonta...@jabber.ccc.de
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/12/2013 10:27 PM, Mike Perry wrote:

Cool story bro.


I know.



We're worried about these things too, I guess.


I believe it. I'm in the market for a bridge, if you'll sell one to me.



I mean, if killing us all is really the best way to stop Tor, then I
would submit to you that Tor is unstoppable. After all, network
engineers are basically throwaway commodities to the mexican mafia:
http://www.wired.com/dangerroom/2012/11/zeta-radio/

I mean, if they kill their*own*  codeslaves^Wemployees, what exactly do
you think murdering us will accomplish?


Well, killing us all wouldn't be necessary, just the core developers 
and the highest-profile advocates.


Minor contributors and patchers would be incapable of maintaining the 
project.


Still, the possibility is entirely within reason.



In the meantime, we have nothing to fear except fear itself. Oh, and
0day. Don't forget to ph34r the 0day. Turns out that shit costs way less
than high-profile assassination contracts (fortunately or unfortunately,
depending on your perspective :/).


Have you read about assassination markets? Are you familiar with that 
concept?


If you can use an anonymous assassination market to place bounties upon 
the heads of government officials, what makes you think they could not 
use the same systems to place bounties upon high-value activists?





P.S. If you're annoyed by this flippant response, it was given because
your rant is basically a long series of FAQs. There are ways to fix your
concerns but they require development effort, and in fact many of them
(including custom pluggable transports and private bridge distribution)
are already supported. For the others: Patches welcome.


I'm afraid I do not follow what you mean by FAQs since I do not see 
any overt interest (or developer consideration) concerning any of these 
features.


I have not seen any stable Tor client release notes announcing private 
bridge authority decentralization.


Did I misread something?



P.P.S. I'll leave the point-by-point discussion to the other NSA thread
participants;)


I'm sure there are many NSA employees here. Contributions to 
cryptography make NSA awesome, but that is dramatically balanced by NSA 
wiretapping. My opinion of the NSA is thus ambivalent.


Though that is off-topic.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/12/2013 10:37 PM, adrelanos wrote:

Hi Alex,

these are interesting thoughts. I wrote something related a while ago.

Tor: lobbies vs lobbies - Who will prevail?:
https://lists.torproject.org/pipermail/tor-talk/2012-August/025109.html

Alex M (Coyo):

Is Tor ever going to include support for isolated, independent bridge
relay communities that can host their own bridge directory authorities
without relying on the centralized tor directory hosted by Peter
Palfrader, Jacob Appelbaum and associates?

Good idea in general. (Although I don't share your reasons for it.)


What reasons would you have, then?


 From lurking here on the mailing lists and other places, Jacob and other
core Tor staff and advocates generally seem to have a worryingly
optimistic attitude toward the possibility of coordinated Tor
censorship, crackdowns, network manipulation and attack, coordinated
government raids upon Tor directory servers,

I am interested, where did they say so?


I am too tired and physically ill with an upper-respiratory infection to 
dig through mailing list archives at the moment.


If it is important that I shoulder the burden of proof, remind me later 
when I'm not coughing up blood.



or even assassinations
against Jacob Appelbaum and other core staff and volunteers involved in
the Tor project.

Why assassinations? I've heard the some mafia style groups have a better
method than violence. They catch a child after school, make up some
Your parents told me to catch you today, I am your Uncle Sam. story,
aren't violent or threatening at all and go into some Disney land copy,
bring back the child afterwards. Not sure if that happens in reality,
but I am sure that works better than violence.


I do not understand how taking a child to a theme park relates in any 
way to Jacob Appelbaum being tagged and bagged.


May I ask for a clarification here?



Other than that, it seems obvious to me that killing people isn't
effective as turning them around. Why wouldn't they rather use violence
to force them to put a backdoor into next Tor version?


That isn't quite as trivial as you make it sound, and really, it's 
unnecessary.


It is a general consensus that the united states federal government has 
full access to the directory authorities and majority of guard nodes and 
exit nodes within the united states.


It is a general consensus that the Tor network provides only illusory 
anonymity to any user hostile to united states military supremacy.


The Tor network is a historical toy created by the united states 
military, and is just as possessed and controlled by the united states 
military as it has been from day one.




As far I know no Tor developer has been harassed for Tor yet. (Please
tell me if I am wrong.) Jacob has been harassed like in a totalitarian
state because of his connections to wikileaks. I also wonder how Jacob
could stay so calm after all what happened to him, not being already a
broken man. I admire the Tor developers for doing their work in such a
dangerous country (US), knowing about waterbording and that stuff.


Is it really so difficult to conceive of situations that involve violent
raids against the datacenters hosting Tor directory servers and their
mirrors, attacks, possibly physically violent, involving full military
force against Jacob Appelbaum and other critical developers, staff,
volunteers and advocates?

If that happens, that would be the worst case. I think without Tor
servers in the US and without the Tor developers, there is more Tor
network, since most Tor servers are in the US. Most other Tor servers
are in countries which the US can pressure as well. When the US decides
to take down Tor, it's pretty much over anyway.


My point exactly.


You really think the governments of the industralized first world
countries won't stoop that low?

Maybe they don't have to. When I understood Jacob in his speeches right,
he doesn't believe that Tor does defeat the NSA. Why should they break
Tor if it's an open book already to them already anyway?


Tor is not designed (in its current form) to even attempt to contest NSA 
control and manipulation.



One day, they will accuse Jacob and the other core developers of being
domestic terrorists or whatever as an excuse to fire upon native
citizens on domestic soil.

They will do it, one day.

Only in case they can't easily break Tor already anyway.


Tor is already broken.

Services like The Hidden Wiki, Silk Road, and other high-profile hidden 
services are obviously honeypots and sting operations, since those 
hidden services would have been raided immediately abd their admins 
arrested without a court hearing or judicial oversight of any kind. Do 
no pass Go, do not collect 200 worthless united states dollars, go 
directly to Guantanamo Bay (or whatever the current replacement is).



This is why providing relatively trivial means to deploy one's own
bridge communities with many pluggable transports in order to prepare
for that 

Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Gregory Disney
I'm down to help with the rebuild.


On Sat, Apr 13, 2013 at 12:39 AM, Alex M (Coyo) c...@darkdna.net wrote:

 On 04/12/2013 11:01 PM, adrelanos wrote:

 Griffin Boyce:

 There's really nothing keeping you from making a private bridge network.
   The documentation's all there.

 Indeed. One can even make its own (private) Tor network. It will require
 a considerable amount of learning, though.

 It would be interesting to see several competing Tor networks. May or
 may not happen in long term future, if Tor can attract much more users
 and relays.

 Alex probable won't be up for creating an alternative Tor network with
 that threat model. As soon as you host a relay or directory authority,
 it's difficult (impossible?) to stay anonymous, you move yourself into
 the target line by doing so.


 With the current Tor network model, this is apparent.

 I might fork the Tor codebase and redesign the network from the ground up,
 and see what I can come up with.

 Should be interesting.

 Even if Tor cannot be salvaged, working with the traditional 3rd
 generation onion routing paradigm should be educational and instructive.

 __**_
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/**cgi-bin/mailman/listinfo/tor-**talkhttps://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/12/2013 11:01 PM, adrelanos wrote:

Griffin Boyce:

There's really nothing keeping you from making a private bridge network.
  The documentation's all there.

Indeed. One can even make its own (private) Tor network. It will require
a considerable amount of learning, though.

It would be interesting to see several competing Tor networks. May or
may not happen in long term future, if Tor can attract much more users
and relays.

Alex probable won't be up for creating an alternative Tor network with
that threat model. As soon as you host a relay or directory authority,
it's difficult (impossible?) to stay anonymous, you move yourself into
the target line by doing so.


It fills me with indescribable patriotism, nationalist love for my 
country, the heartland, home of the free.


My experiences with tor imply the child porn archives, the silk road and 
other drug exchange markets, the hackbb and other cracker/carder 
communities and other high-profile hidden services (eepsites) are all 
implicitly honeypot sting operations run by the united states military 
and federal agencies.


My country is constantly vigilant, and protects us from all the evil 
drug-addled hippies, perverted child-lovers, dangerous cyberterrorists 
and other dissident intellectuals quietly preparing for countless acts 
of domestic terrorism and treason against my beloved country and her 
rightful representatives and public servants.


I love my country, I love my federal and state governments, and I have 
complete faith in the competency, legitimacy, authority and moral 
superiority of my beloved country's representatives and public servants.


I love how my country looks after us all like a doting father, 
performing deep packet inspection, email, sms text, phone call and skype 
message interception like a responsible and watchful father over his 
children.


I love how my country obviously knows what's best for me, my family, my 
friends, my community, and fellow citizens and is stern but fair, 
disciplining us when we misbehave and rewarding us when we behave like 
model citizens.


I love how my country promises that if I have nothing to hide, I have 
nothing to fear but fear itself.


My country is obviously the best, hands down.

:P
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Mike Perry
Thus spake Alex M (Coyo) (c...@darkdna.net):

 P.S. If you're annoyed by this flippant response, it was given because
 your rant is basically a long series of FAQs. There are ways to fix your
 concerns but they require development effort, and in fact many of them
 (including custom pluggable transports and private bridge distribution)
 are already supported. For the others: Patches welcome.
 
 I'm afraid I do not follow what you mean by FAQs since I do not
 see any overt interest (or developer consideration) concerning any
 of these features.

If you have a specific list of design flaws that aren't couched in long
rants, we can perhaps help instruct you on how you might solve them in
your redesign with Mr Disney, or at least point you toward some tickets
you two should read and follow during that process.

Otherwise, thanks for your concern/veiled threats/trolling.

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/13/2013 12:13 AM, Mike Perry wrote:

Otherwise, thanks for your concern/veiled threats/trolling.


Because obviously criticism and actual concern for the well-being of a 
foss project is always trolling and threats.


I hope you aren't a contributor.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridge Communities?

2013-04-12 Thread Alex M (Coyo)

On 04/13/2013 12:13 AM, Mike Perry wrote:
If you have a specific list of design flaws that aren't couched in 
long rants, we can perhaps help instruct you on how you might solve 
them in your redesign with Mr Disney, or at least point you toward 
some tickets you two should read and follow during that process. 
Otherwise, thanks for your concern/veiled threats/trolling.


Though, with that attitude of yours, I'm afraid I'm uninterested in any 
assistance you may deign to bestow upon Gregory Disney and I.


I'm confident we can do just fine without your arrogance.

Obviously, your selfless concern for your userbase knows no bounds.

It concerns me that you refer to we as though you contribute anything 
to the tor project.


I'm sure the tor coders are going to be more than happy to support the 
foss ideals in this case in regards to codebase forking rights.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk