Re: [EMAIL PROTECTED]: Re: Wikipedia Tor]

2005-09-28 Thread lists

Tyler Durden wrote:
Sorry...I don't understand...why would psuedonymity services be provided 
within Tor?




I find the concept of having both pseudonymous and anonymous traffic
through TOR quite interesting. In some cases, you really do wish to just
separate yourself from your meatspace identity but you may want the
reputation of a bitspace identity; in other cases, you want to
completely separate yourself from any identity. There are audited
anonymizers that provide a form of pseudonymity, in that, they know who
you are and can regulate your behavior accordingly. These are generally
in the commercial space. Building a TOR nymspace would be much more
interesting and distributed.

TOR itself does not necessarily have to deal with this. There could be
services flowing through TOR that provide this. However, TOR nodes
implementing pseudonymous traffic for their own network seems more
natural and easier to do. Entry/exit nodes, some nodes, all nodes, or
whatever subset makes the most sense could then authenticate
pseudonymous traffic and determine capabilities based on things like
reputation.

But, that was not a why. Anonymity has the property of removing
responsibility from the actor for their actions, which is not always a
good thing. I am sure TOR exit nodes are hit with the responsibility for
those actors, which can lead to the end of exit nodes. At a minimum,
pseudonymity can provide a degree of responsibility through reputation.
Exit nodes could support either pseudo or anon, or both, depending on
beliefs, risks, etc. Also, users could select anon or pseudo as needed.
I like choice.

Anyway, that is a why and an interesting topic, but TOR has other things
to focus on.

-Andrew



Re: The cost of online anonymity

2005-09-12 Thread lists

From: R.A. Hettinga [EMAIL PROTECTED]

  http://news.bbc.co.uk/1/low/programmes/click_online/4227578.stm

   Digital evidence expert at the London School of Economics, Peter Sommer
  says: A few years ago I was very much in favour of libertarian computing.
 
   What changed my mind was the experience of acting in the English courts
  as a computer expert and examining large numbers of computers from really
  nasty people, who were using precisely the same sort of technology in order
  to conceal their activities.

Assuming someone has come under suspicion in some other way and that they
continue to use a computer to view illegal material wouldn't the likes of
TEMPEST, hidden cameras and tampering with the suspect's software provide
all the computer-based evidence necessary ?

Combine that with a raid thats finds only one person in the house at the time
and what more do you need ?  I think it should be possible to debunk the idea
of lawlessness expressed in the article.

There is also this mail from (I think the same) Mr Sommer
http://lists.virus.org/ukcrypto-0311/msg00215.html
that mentions wider goals, but even these may be tackled to some extent
by observations like thoe above.   Especially (in the absence of Trusted 
Computing!)
and amended version of Freenet s/w that produces concealed logs.

I suppose some estimate of the number of really nasty people, of Freenet users
and the cost of investigating this way would be good to have.

According to this article
http://www.wsacp.org/child-porn-news/Child_%20Pornography.htm
there's an attempt to speed up Operation Ore (and I think all will agree it
needs it).


   Peter Sommer says: Ian [Clarke] is placing a powerful tool in the hands
  of other people. He's like an armaments manufacturer.

Should we see as virtual armaments all encryption software, digital cameras,
CD burners etc ?  And if not where should the line be drawn ?