Re: [tor-talk] problem

2015-04-30 Thread Leon Johnson
Can you include your torrc config file?

On Wed, Apr 29, 2015 at 2:23 AM, folde38 fold...@gmail.com wrote:

 29/4/15 9:21:04.145 [NOTICE] Opening Socks listener on 127.0.0.1:9150
 29/4/15 9:21:04.145 [NOTICE] Renaming old configuration file to
 /Applications/TorBrowser.app/TorBrowser/Data/Tor/torrc.orig.1
 29/4/15 9:21:04.632 [NOTICE] Bootstrapped 5%: Connecting to directory
 server
 29/4/15 9:21:04.634 [WARN] Problem bootstrapping. Stuck at 5%: Connecting
 to directory server. (No route to host; NOROUTE; count 1; recommendation
 warn; host 7EA6EAD6FD83083C538F44038BBFA077587DD755 at 194.109.206.212:443
 )
 29/4/15 9:21:27.933 [WARN] Problem bootstrapping. Stuck at 5%: Connecting
 to directory server. (No route to host; NOROUTE; count 2; recommendation
 warn; host BD6A829255CB08E66FBE7D3748363586E46B3810 at 171.25.193.9:80)
 29/4/15 9:21:34.121 [NOTICE] Closing no-longer-configured Socks listener
 on 127.0.0.1:9150
 29/4/15 9:21:34.121 [NOTICE] DisableNetwork is set. Tor will not make or
 accept non-control network connections. Shutting down all existing
 connections.
 29/4/15 9:21:34.122 [NOTICE] Closing old Socks listener on 127.0.0.1:9150
 29/4/15 9:21:34.632 [NOTICE] Delaying directory fetches: DisableNetwork is
 set.

 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] The Tor-BSD Diversity Project

2015-04-30 Thread Apple Apple
I am not particularly enlightened but I was under the impression that
people do not use BSD for a reason.

It's 2015 and FreeBSD is still lacking basic security mechanisms such as
ASLR. It also seems to me that the community's ideological licencing
crusade is holding the entire project back. They condemn anything GPL and
will substitute inferior tools instead, I.e. ksh instead of bash, virtual
box instead of xen etc. As a project they seem to spend most of their time
rewriting GPL projects just to slap a BSD licence on it (bhyve or whatever
they call it for example) which doesn't really help anyone. It's like
Canonical dicking around with Unity and Mir. Complete waste of everyone's
time.

OpenBSD is also a highly emotionally charged community. They completely
turn their backs on things like virtualization and mandatory access
controls. They spend all their time auditing the base system but as soon as
you install a buggy or untrusted application then you're on your own. I
don't find this approach very helpful in the real world.

Would anyone who knows more care to address these points and correct me
where I may be wrong?

I like the idea of diversifying the Tor infrastructure, defence in depth
and all that but I feel like it would be nice to also have some clear
arguments for why another OS should be adopted - not just it exists and
it's not Linux.

 an idea: maybe talk to forums.freebsd.org / www.freebsdforums.org
 operators about making their sites available also to tor users as well?

This would be immensely helpful and appreciated. There is no reason to
block even read only access to the forums.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] The Tor-BSD Diversity Project

2015-04-30 Thread Josef Stautner
If you ask me he wrote some valid points.

~Josef

Am 30.04.2015 um 15:15 schrieb Nathaniel Goodman:
 On April 30, 2015 1:27:35 PM GMT+01:00, Apple Apple 
 djjdjdjdjdjdj...@gmail.com wrote:
 I am not particularly enlightened but I was under the impression that
 people do not use BSD for a reason.

 It's 2015 and FreeBSD is still lacking basic security mechanisms such
 as
 ASLR. It also seems to me that the community's ideological licencing
 crusade is holding the entire project back. They condemn anything GPL
 and
 will substitute inferior tools instead, I.e. ksh instead of bash,
 virtual
 box instead of xen etc. As a project they seem to spend most of their
 time
 rewriting GPL projects just to slap a BSD licence on it (bhyve or
 whatever
 they call it for example) which doesn't really help anyone. It's like
 Canonical dicking around with Unity and Mir. Complete waste of
 everyone's
 time.

 OpenBSD is also a highly emotionally charged community. They completely
 turn their backs on things like virtualization and mandatory access
 controls. They spend all their time auditing the base system but as
 soon as
 you install a buggy or untrusted application then you're on your own. I
 don't find this approach very helpful in the real world.

 Would anyone who knows more care to address these points and correct me
 where I may be wrong?

 I like the idea of diversifying the Tor infrastructure, defence in
 depth
 and all that but I feel like it would be nice to also have some clear
 arguments for why another OS should be adopted - not just it exists and
 it's not Linux.

 an idea: maybe talk to forums.freebsd.org / www.freebsdforums.org
 operators about making their sites available also to tor users as
 well?

 This would be immensely helpful and appreciated. There is no reason to
 block even read only access to the forums.
 Here be trolls.




signature.asc
Description: OpenPGP digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Aeris
 who wants to use pays, who want to help the network with
 a exit node receives, simple like that

So who wants to have anonymity must be rich ?
Just no way :)

-- 
Aeris

Protégez votre vie privée, chiffrez vos communications
GPG : EFB74277 ECE4E222
OTR : 922C97CA EC0B1AD3
https://café-vie-privée.fr/

signature.asc
Description: This is a digitally signed message part.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Speak Freely
Allen,

Thanks for pointing that out. After reading the website... Whoa.

This seems to me a central bank's/Federal Reserve's ultimate wet dream.

The government can track and tax who has what where when, but your
identity does not have to be revealed to the merchant.
Unless of course you actually bought something (corporeal), in which
case you need to give a name and address.

Super.

This seems like the antithesis of a good idea.




Matt
Speak Freely
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Akater
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Check out OpenLibernet (http://openlibernet.org) They suggest a design
for a fee-based mesh network. It's worth some studying, just to grasp
the complexity of the problem.

Also, you will probably find little enthusiasm from Tor community
for this.

What actual problem does the fee-based network solve? Free market is
the best mechanism* to allocate scarce resources. Bandwidth is not
that scarce, while private and pseudonymous or anonymous Internet
access is not that desired (which is demonstrated clearly by how
almost anyone who knows about benefits of Tor, GNU or PGP doesn't even
bother trying). The lack of demand leads to the fact that Tor works
fine even without being terribly efficient. Nobody cares about
effective free market solution, and it may be that nobody will until
it's too late.

Thus, with a fee-based network, you target a rather narrow initial
audience---which is not bad at all in itself, but, it hence requires a
design far elaborate than something that can fit into a short
plain-text email message. And a *very* clear understanding why** you'd
want something better than Tor in its present state---not just
because free market makes things better. Sure it does but 1) lots of
engineers currently in the distributed networking will disagree; 2) a
better thing will not necessarily survive unless it's so much better
that even a blind (which in our case would be a casual user)
will see it.

- 

* A thermodynamic term would fit better but I'm close to being
ignorant in thermodynamics.

** Some examples: a) Tor is less secure than it could be because it is
not attractive enough for users to run its exit nodes; b) it is at
mild risk of extinction, for the same reason; c) running a BitTorrent
client via Tor is still regarded a bad idea; d) setting up an onion
server and advertising it is more difficult than it should be.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (MingW32)

iQEcBAEBAgAGBQJVQnFJAAoJEFrbru/Rghxvpd8H/3TJm8kxDHhkR9ezRs+glRv7
N4QNT/lsp510kjj6ygEY62orXd41yO9BcpIBUNUFCu3iM7kurd9OpW9swqn8HG2P
mY7X9Czg9oWsaXDmhZ9S/utjPk6X5FGOEZBiB8+jRiNoVq1BenYuFm5BWUtFe9Rd
UjO0QWm0WoquS9+eV3iBpMBYWGn6RReyw3sO5YcVmF5g5t9euhERpv2NRn4LEFU8
8fjGMrxY0VvEIEU08bdrafYJy1eLwM8ZHFuNFVxWmUnvRMyAspPTimRX8Uq/0FMf
jBbTkfND1uDTdZDtWBnYaxBag23djGFuhKE55L5AMe7oYQuoMCuhehdkKQfJfuw=
=0GHv
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is being detected to alert upon?

2015-04-30 Thread Frederick Zierold
Unfortunately, I cannot see their signature set.  They have it locked
down.  They claim they are not detecting it by IP address.



On 4/30/2015 2:24 PM, Speak Freely wrote:
 The list of exit nodes is public information. The Tor Project publishes
 the information, and several spam blocking services also publish them
 under varying pretenses.
 
 What the vendor sees is the IP address of the exit relay hitting their
 server.
 
 If you had more information to provide, we could provide more feedback. :)
 
 
 Hope that helps.
 
 
 Matt
 Speak Freely
 

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is being detected to alert upon?

2015-04-30 Thread Frederick Zierold
Thanks for replying.  I understand it is a spy vs spy type of situation but
what do they see currently?  I don't believe they are seeing it by the IP
addresses (or so they claim).

Is it something in the handshake the is triggering the alert?



On Thu, Apr 30, 2015 at 2:17 PM, Seth David Schoen sch...@eff.org wrote:

 Frederick Zierold writes:

  Hi,
 
  I am very curious how a vendor is detecting Tor Project traffic.
 
  My questions is what are they seeing to alert upon?  I have asked them,
  but I was told that is in the special sauce.
 
  Is the connection from the users computer to the bridge encrypted?
 
  Thank you for your insight.

 Are they detecting non-public bridge traffic, or only normal entry
 guards?

 Detection and obfuscation is kind of a big topic that's been around for
 some years, so there are a lot of possibilities.

 --
 Seth Schoen  sch...@eff.org
 Senior Staff Technologist   https://www.eff.org/
 Electronic Frontier Foundation  https://www.eff.org/join
 815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk




-- 
-- 


Frederick Zierold, CISSP
University Information Security Office (UISO) Security Analyst

Direct: 202-687-5784
Office: 202-687-3031
Fax: 202-687-1505

UISO Security Services:
http://security.georgetown.edu, 202-687-3031 or secur...@georgetown.edu

UISO Identity  Access Management Services:
http://netid.georgetown.edu, 202-687-2999 or ne...@georgetown.edu)
https://www.facebook.com/GeorgetownTechnology
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] What is being detected to alert upon?

2015-04-30 Thread Frederick Zierold


Hi,

I am very curious how a vendor is detecting Tor Project traffic.

My questions is what are they seeing to alert upon?  I have asked them,
but I was told that is in the special sauce.

Is the connection from the users computer to the bridge encrypted?

Thank you for your insight.



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Gmail is blocking sending email from smtp.gmail.com

2015-04-30 Thread Akater
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 No, Google does not block tor.  It happened to me as well with
 error messages intrusion detected and insecure device. I had to
 modify Google security settings to make it work.

Could you please tell what exactly did you modify? I've been using
Thunderbird for Google SMTP successfully for quite some time, until
recently. I had to change password to be able to receive mail (had to
change it several times actually, which is really stupid) but sending
has become really bizarre: it didn't work for some time, then I
somehow sent two messages, and now it's dead again. In the end, I had
to turn TorBirdy off to write this, as well as the previous message to
this list. Looks like something is actually happening (or happened).
Note: I'm using different Gmail accounts for mail fetching and sending.

I noticed a topic “TorBirdy connects to the same exit node again and
again” here but haven't read it yet.

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (MingW32)

iQEcBAEBAgAGBQJVQnWHAAoJEFrbru/RghxvmMYH/3EOeYXy/CwoXYPgpiWEcZFM
vhy/eMs2RZilnx4PGmZDgQsxxtmY/CKkwa2NNjWN8hOvYof+bbflVR/KUT/p3+Nu
2T1lB4RGSjuDHj5AgCA4YySMKLLJ9KyAxYmVFEodxZmBMMnK3w0zbIKUPF5ISApr
lKGwxHTixOG0tLFRzsrla14zfJ+t9//Pemsg1k8caBsU4tk+/sVjIcl6H4abASDK
23FRR+dW/EFKS8wiZnfud72L0JVTRa66qPErIuWrfg1u2AHu4QDFanJYFR5x6o10
5OhnnXdw22KSUMpL64jRs9xb4sf0ILa2Fo3bhNcMSWFJvDXRu0LtYuaMyHrL4uE=
=siSd
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is being detected to alert upon?

2015-04-30 Thread Speak Freely
The list of exit nodes is public information. The Tor Project publishes
the information, and several spam blocking services also publish them
under varying pretenses.

What the vendor sees is the IP address of the exit relay hitting their
server.

If you had more information to provide, we could provide more feedback. :)


Hope that helps.


Matt
Speak Freely
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is being detected to alert upon?

2015-04-30 Thread Seth David Schoen
Frederick Zierold writes:

 Hi,
 
 I am very curious how a vendor is detecting Tor Project traffic.
 
 My questions is what are they seeing to alert upon?  I have asked them,
 but I was told that is in the special sauce.
 
 Is the connection from the users computer to the bridge encrypted?
 
 Thank you for your insight.

Are they detecting non-public bridge traffic, or only normal entry
guards?

Detection and obfuscation is kind of a big topic that's been around for
some years, so there are a lot of possibilities.

-- 
Seth Schoen  sch...@eff.org
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Jeff Burdges

On 30 Apr 2015, at 11:57, Allen allen...@gmail.com wrote:

 If you want anonymous transactions then you want a blind-signing based
 currency like Taler  
 
 Surely you jest...
 
 From http://www.taler.net/governments
 
  Taler is an electronic payment system that was built with the goal of
 supporting taxation. With Taler, the receiver of any form of payment is
 known, and the payment information comes attached with details about what
 the payment was made for. Thus, governments can use this data to tax
 buisnesses and individuals based on their income, making tax evasion and
 black markets less viable.

In an RSA blind-singing based currency, like Taler, a mint who issues the 
currency can track how much money a particular account sends or receives, but 
cannot discover the actual transfers.   And deanonymizing one transaction does 
not impact a user's anonymity overall.  

In Bitcoin, et al., everyone can track everything about every account at any 
point in the past.  Accounts are pseudonymous and creation is distributed, but 
deanonymizing a single transaction destroys the anonymity of the whole account. 
 And advanced attacks can be brought to bear on identifying sock puppet 
accounts.  

Yes, RSA blind-sinigng assumes the buyer remains anonymous to the seller, like 
say buying server time for an anonymous website.  Anytime you deanonymize 
yourself to a seller, like by buying physical goods, then you’re trusting them, 
this goes for Bitcoin too.  In fact, deanonymizing yourself like this is much 
worse in Bitcoin. 

Jeff


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Felipe Micaroni Lalli
Thank you Matt. I'm sorry if I didn't have a good idea, you were convincing.

I figured it could have implications for anonymity but imagined could exist
a solution (there is always). About the numbers, it was just a totally
random number, I'm sorry, I could used more real numbers as example.

The problem in charge (too much) an exit node is that no one would use
that. Imagine if all users set the max spending to zero. In this case, it
would be useless to charge a exit node even with 1 Satoshi / MB because no
one would use it anyway. The market would find a good number, and my guess
is that would be ridiculously cheap to have a good number of exit nodes and
free would give almost the same experience as today we have.

It is not a matter of poor is less important, but create proper
incentives. For example: I'd like to run an exit node, but I'm pretty sure
if I do that the government here in Brazil will hunt me. It is very
dangerous to do that in Brazil. So, for me, it does not worth to risk it
for free. I'd put a very expensive price to my exit node because I want
little flow. Remember: I don't run an exit node anyway.

Well, if this is not good for Tor as it was designed, I guess I could make
a fork in Tor project and implement that, couldn't I?



Thank you!



On Thu, Apr 30, 2015 at 12:14 PM, Speak Freely when2plus2...@riseup.net
wrote:

 There are tons of problems with the suggestion, IMMHO.

 Good read:
 https://blog.torproject.org/category/tags/bitcoin

 I have very strong reservations about anyone suggesting internet fast
 lanes, or pay to play lanes.

 I run my relays for everyone, equally. If someone is poor, that doesn't
 mean they are any less important. For the purposes of Tor, chances are
 poor people match more closely to Tor's project goals. Based entirely on
 nothing but a guess, I would expect a poor person to be more willing, or
 more inclined to be a whistle blower, or more interested in political
 change, or more dedicated to social improvement, over a debutante
 dilettante. A very well off white guy in middle America suburbia has
 nothing to lose provided the status quo remains. A very poor person has
 nothing to gain from the status quo, so would tend to try to improve
 themselves, and others.

 It would also introduce fascinating attack vectors, as it would be
 relatively easy to determine who the poor people are vs who the rich
 people are, based simply on what a particular relay charges for it's
 service. The reduced anonymity set would present interesting problems.

 Assuming your numbers, at today's rate, 0.001BTC would be $0.23USD/MB
 ($0.28 for us Canadians).
 $0.23/MB@100GB/day = $23,000/day
 $0.23/MB@3TB(100GB*30)/month = $690,000/month
 That's a disturbingly good ROI, considering the cost for the operator
 would be anywhere between $3-15/month.
 (For a rich person to download a 1GB file, it would cost them $230.)


 Finally, attempting to monetize a system that is currently free as in
 beer, would not necessarily bring out the best in people. Sure, some
 operators would run their relays for free, but many wouldn't. When
 certain people realize that they could monetize the relay, what's to
 stop them from sniffing the data to make even more money?


 BUT, what do I know. Read the blog, it's much better written than my
 gibberish regarding this topic.



 Matt
 Speak Freely

 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Gmail is blocking sending email from smtp.gmail.com

2015-04-30 Thread Juan Miguel Navarro Martínez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Akater:
 No, Google does not block tor.  It happened to me as well with 
 error messages intrusion detected and insecure device. I had
 to modify Google security settings to make it work.
 
 Could you please tell what exactly did you modify? I've been using 
 Thunderbird for Google SMTP successfully for quite some time,
 until recently.

In my case, not sure about the one who replied.

- - 2FA activated
- - Using application password for Thunderbird

Haven't had any Gmail problem with Tor

I would recommend trying to log in Gmail using TorBrowser.
-BEGIN PGP SIGNATURE-

iQEcBAEBCgAGBQJVQoQjAAoJEELfPuRPJIB7Be0IAMgMcZ23q7K3RWCzXPfcuWQQ
M0utI7gmPbfA/ygBQP1WJxbK8S/+UMPCQ7QieOJlx3+F7rU01e/HQE/v6CA/etL2
ZT72ARpx7ajjrtHBkqnGHaRl7T7VMyN0OH/Hij2KDOBCuoc3qj87mWDb09b1pfxP
5OaIsOctgHK2WEYZPAi6e8gvjkD0bSV29Cl5Rltnxbl8DJVDEffLZ6BzAYQdkqXm
IjMScDK3052FlTDAV3+YTiNu3epPUO0bUFYFcw9G69fpq7EJ0irjJiNF3Z+OzDpc
LKbYrdh3LNHxm+RDZZAVCE7iZ1Vpm5OcJdhbfIuiZIlgkz1E7jowl23p54Q06H0=
=O9zN
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is being detected to alert upon?

2015-04-30 Thread tor

On 04/30/2015 09:15 PM, Frederick Zierold wrote:


 Hi,

 I am very curious how a vendor is detecting Tor Project traffic.

 My questions is what are they seeing to alert upon?  I have asked
them,
 but I was told that is in the special sauce.

 Is the connection from the users computer to the bridge encrypted?

 Thank you for your insight.




Special Sauce, I'll buy that for a dollar ..

At a minimum, there are different kinds of detection for Tor within 
the Snort Emerging Threats Free-version signatures. So, this isn't 
even 'hard' necessarily.


One rules file is dedicated to it (emerging-tor.rules), that file has 
all the Tor IP addresses hardcoded into it. Additionally, there are 
other, non-IP-address related detections for Tor within other rules 
files (do an egrep in the directory for Tor  to see those).


If you run Snort with the emerging threats ruleset, but disable the 
emerging-tor.rules (removing its awareness of the IP addresses of tor 
nodes), it still gives 3 alerts when Tor starts up. ET POLICY TLS 
possible TOR SSL traffic. That's with a regular Tor connection, I 
don't know if bridges would change anything.




--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] The Tor-BSD Diversity Project

2015-04-30 Thread Apple Apple
I apologise for my previous message. My finger slipped.

On 30 Apr 2015 21:03, Yuri y...@rawbw.com wrote:
 Bash can't be considered superior to anything...

I am not particularly interested in arguing the merits of bash vs sh. I
agree that there are some definite cases where adopting alternative
technology has been the right step forward for the FreeBSD project,
migrating from GCC to LLVM for example. My point is that there has also
been unnecessary suffering and wasted effort caused by rejecting code based
entirely on licencing ideology. As a pragmatic user with no interest in
selling other people's work, this ideology gives me no benefit but costs a
lot.

And here goes the credibility of your opinion for me.

http://www.logicallyfallacious.com/index.php/logical-fallacies/87-fallacy-of-composition

http://www.logicallyfallacious.com/index.php/logical-fallacies/99-genetic-fallacy

I would like a serious discussion, please.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Speak Freely
Hi Felipe,

It's an issue that is relevant to Tor, and in many online communities.
So please don't think it's a bad idea, it's just a very complicated one.

Incentivizing (part of) the system is not necessarily a bad thing.
Something to encourage bigger and better relays is good.

One potential work-around would be to allow up to X% of any given relay
to be used for the express lane, but to always have the rest completely
open. I could envision up to 10% of total throughput to be dedicated to
paying customers, and 90% for everyone else. If every exit relay's
express quota is full, you wouldn't pay. At most I think $10USD/TB would
be acceptable - though I'm not a fan of this anyway.


Personally, I'm a fan of badges and social rewards. I've read quite a
few books and many blogs and studies on the topic. For several varying
reason, people like to collect things, regardless of actual monetary
value - and in fact sometimes directly because of the lack of monetary
value. A reward that must be earned and cannot be purchased. The social
standing badges and awards create is fascinating. I fully appreciate
this may not work given the current community atmosphere, but I mention
it nonetheless because it is interesting.


Regarding forking the system, of course you could! But that leads to so
many other issues...

---

Akater,

BT on Tor is bad for at least 2 reasons.
1) BT will do what it what it can to connect to peers, including
bypassing Tor, which could leak information about you, which negates the
reason for downloading off Tor. This isn't Tor's fault.
2) It's just mean! :)

I find the BT/Tor problem to be... BT. This is beyond the scope of this
discussion, however.

A good blog post is
https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea


Matt
Speak Freely
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] The Tor-BSD Diversity Project

2015-04-30 Thread Apple Apple
On 30 Apr 2015 21:03, Yuri y...@rawbw.com wrote:
 Bash can't be considered superior

And here goes the credibility of your opinion for me.

 Yuri

 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] The Tor-BSD Diversity Project

2015-04-30 Thread Yuri

On 04/30/2015 05:27, Apple Apple wrote:

It's 2015 and FreeBSD is still lacking basic security mechanisms such as
ASLR. It also seems to me that the community's ideological licencing
crusade is holding the entire project back. They condemn anything GPL and
will substitute inferior tools instead, I.e. ksh instead of bash, virtual
box instead of xen etc. As a project they seem to spend most of their time
rewriting GPL projects just to slap a BSD licence on it (bhyve or whatever
they call it for example) which doesn't really help anyone. It's like
Canonical dicking around with Unity and Mir. Complete waste of everyone's
time.


Bash can't be considered superior to anything due to its instability. It 
is in forever-work-in-progress mode, without gaining any stability over 
time. Last week I found another bug in bash just by pressing backspace 
button in the middle of some command. Bash team officially refuses to 
maintain any bug tracking tools, and uses the mailing list instead. So 
the bugs I reported years ago are still not fixed, and there is no 
formal record of them that can be easily searched. Bash departed from 
the very stable and solid Bourne shell, and turned into a mess. Today 
Bourne shell in FreeBSD is far superior to the current bash for the 
reason of its stability, among other reasons. I have spent an extensive 
time with both, and wrote thousands of lines in shell, and this is my 
conclusion. And here goes the credibility of your opinion for me.


Yuri
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is being detected to alert upon?

2015-04-30 Thread Philipp Winter
On Thu, Apr 30, 2015 at 02:20:34PM -0400, Frederick Zierold wrote:
 Thanks for replying.  I understand it is a spy vs spy type of situation but
 what do they see currently?  I don't believe they are seeing it by the IP
 addresses (or so they claim).
 
 Is it something in the handshake the is triggering the alert?

Here's how the Great Firewall does it:
http://www.cs.kau.se/philwint/gfw/

And here are some thoughts on TLS handshake signatures that can be used
to fingerprint traffic:
https://trac.torproject.org/projects/tor/wiki/org/projects/Tor/TLSHistory

Cheers,
Philipp
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Akater
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512



Speak Freely:
 BT will do what it what it can to connect to peers, including 
 bypassing Tor

I put c) into the list assuming BT is not recommended because of
traffic overload, which then would be one real life case of scarce
bandwidth. Is heavy traffic not the issue anymore? (Last time I
checked was a year and a half ago.) Fine then.

-BEGIN PGP SIGNATURE-

iQEcBAEBCgAGBQJVQoF7AAoJEFrbru/RghxvekEIAIsBsorsTvu5//KxA/7urv9X
EzofHO7fRgx7szOdu3nn8BpRdkRVwD5BzyeENQ5kSvvQrFYlM1NQLdbNIa+GmREF
laNT1kqY9GxekBT7JerggEUEtt5fEEgRTNGtr/nLe1b1ZHwtMNwY9PZQESmkGLAX
Q/6REKb5QI9s5WxEMu3NwdtV8i9mreSRNXpItX9wGMS6ls2PtxSxtKnyoA1n1Hak
FjGsf4kFGbopF1dWf7X91cj7QBXvSN9KcW1BX1kq5MmVzBKyUjDHGSEibNb3yaNC
xJs9rQDe5suJCJih1AUmBN/w/OfkEwVxyQGZoKlaKEBSXIrej1TKDsqgs3VHR5A=
=/gH3
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Speak Freely
Hi Akater,

Traffic overload is still an issue, yes. This causes problems for
everyone. That was my #2, being mean. Sorry for not clarifying that.
Good read:
https://svn.torproject.org/svn/projects/roadmaps/2009-03-11-performance.pdf
It's a few years old, but covers a lot and still relevant.

But the reason for not using BT over Tor is IMHO more than anything a
security/anonymity issue.

Let's look at the reason why someone thinks they would want to use BT
over Tor.
- They believe it will provide them anonymity.

What benefit would Tor be to the user if their BT client of choice
provided their actual IP address to the tracker and to each peer? The
answer is mostly none. (There are certain circumstances where that's not
completely true, for example ISPs that do DPI to throttle torrent traffic.)

Unless your ISP does DPI and throttles you, you will almost certainly
always download slower, for several reasons I won't elucidate. This just
gives interested parties more time to find you. If your ISP does do DPI,
there are better ways around that. Tor is slow.

BT uses UDP and TCP. Tor doesn't do UDP, but it does TCP very well.
There are ways to block the UDP, but most people would never think/know
about that, and many users find that disabling UDP/DHT makes their peer
count drop which makes them re-enable it immediately out of fear their
download may take a little longer.

So, with a BT client that exposes your real IP address to the tracker
and peers, and DHT through UDP being sent over clearnet, any concept of
privacy/anonymity is broken.

Yes, you can disable DHT. You can block UDP connections. You could find
a BT client that doesn't expose your real IP address. But then certain
mis-steps and limitations within Tor also provide attack vectors for
de-anonymizing torrent users.
https://hal.inria.fr/file/index/docid/471556/filename/TorBT.pdf


... The reasons I say this is because I know someone who used Tor to
download torrents, and his ISP kindly let him know that HBO provided
them detailed logs that he downloaded specific episodes of one of their
most popular shows. He thought he was being very smart and protecting
himself, and was dumbfounded when his ISP contacted him.


Matt
Speak Freely
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Nchinda Nchinda
If interested in implementing this, please check out ethereum.org, it's
derived from bitcoin and much more suitable to creating these constrains.
On Apr 30, 2015 5:14 PM, Aymeric Vitte vitteayme...@gmail.com wrote:

 I did not read this thread completely but keep it in my TODO list.

 Your analysis is correct but can be summarized in one sentence: using bt
 over Tor is a non sense because the size of the Tor network is
 completely ridiculous compared to the size of the bt network.

 As ridiculous as using bt over a VPN, which the bt VPN trolls don't like
 to hear.

 Disabling the DHT and allowing trackers only is at the opposite of any
 privacy protection, because trackers are trivial to monitor and fake,
 it's a little bit more difficult with the DHT, but still easy for
 someone that can crawl it.

 I have tried to explain all this in the FAQs here:
 http://torrent-live.org and here: https://github.com/Ayms/torrent-live,
 and related study, which for once does not focus on trackers and
 monitoring the users, but focuses on the DHT and monitoring/blocking the
 monitors, showing also how easily you can protect using the DHT only,
 assuming that your bt client is willing to (like torrent-live)...

 Tor does not handle UDP but you can tunnel UDP through Tor to some SOCKS
 proxies, which, again, is ridiculous but just works.

 And, again, a possible solution is the Peersm project (which before
 using the DHT does envision new means for peers/content discovery) or
 something similar, a P2P using the Tor protocol, not the Tor network.

 Le 30/04/2015 22:18, Speak Freely a écrit :
  Hi Akater,
 
  Traffic overload is still an issue, yes. This causes problems for
  everyone. That was my #2, being mean. Sorry for not clarifying that.
  Good read:
 
 https://svn.torproject.org/svn/projects/roadmaps/2009-03-11-performance.pdf
  It's a few years old, but covers a lot and still relevant.
 
  But the reason for not using BT over Tor is IMHO more than anything a
  security/anonymity issue.
 
  Let's look at the reason why someone thinks they would want to use BT
  over Tor.
  - They believe it will provide them anonymity.
 
  What benefit would Tor be to the user if their BT client of choice
  provided their actual IP address to the tracker and to each peer? The
  answer is mostly none. (There are certain circumstances where that's not
  completely true, for example ISPs that do DPI to throttle torrent
 traffic.)
 
  Unless your ISP does DPI and throttles you, you will almost certainly
  always download slower, for several reasons I won't elucidate. This just
  gives interested parties more time to find you. If your ISP does do DPI,
  there are better ways around that. Tor is slow.
 
  BT uses UDP and TCP. Tor doesn't do UDP, but it does TCP very well.
  There are ways to block the UDP, but most people would never think/know
  about that, and many users find that disabling UDP/DHT makes their peer
  count drop which makes them re-enable it immediately out of fear their
  download may take a little longer.
 
  So, with a BT client that exposes your real IP address to the tracker
  and peers, and DHT through UDP being sent over clearnet, any concept of
  privacy/anonymity is broken.
 
  Yes, you can disable DHT. You can block UDP connections. You could find
  a BT client that doesn't expose your real IP address. But then certain
  mis-steps and limitations within Tor also provide attack vectors for
  de-anonymizing torrent users.
  https://hal.inria.fr/file/index/docid/471556/filename/TorBT.pdf
 
 
  ... The reasons I say this is because I know someone who used Tor to
  download torrents, and his ISP kindly let him know that HBO provided
  them detailed logs that he downloaded specific episodes of one of their
  most popular shows. He thought he was being very smart and protecting
  himself, and was dumbfounded when his ISP contacted him.
 
 
  Matt
  Speak Freely
 

 --
 Check the 10 M passwords list: http://peersm.com/findmyass
 Anti-spies and private torrents, dynamic blocklist:
 http://torrent-live.org
 Peersm : http://www.peersm.com
 torrent-live: https://github.com/Ayms/torrent-live
 node-Tor : https://www.github.com/Ayms/node-Tor
 GitHub : https://www.github.com/Ayms
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is being detected to alert upon?

2015-04-30 Thread Philipp Winter
On Thu, Apr 30, 2015 at 02:57:01PM -0400, t...@t-3.net wrote:
 One rules file is dedicated to it (emerging-tor.rules), that file has all
 the Tor IP addresses hardcoded into it.

That's probably not very effective because the Tor network has quite a
bit of churn, which would lead to plenty of false positives and false
negatives.  You would have to update this list pretty much hourly.

Cheers,
Philipp
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Akater
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Thank you for this detailed exposition! Actually, I never gave any
thought about how BT, being a distributed network itself, would
interact with Tor---which was pretty stupid of me, since the flaw is
quite obvious. My item c) should have been just you can't share heavy
media content efficiently with Tor.


-BEGIN PGP SIGNATURE-

iQEcBAEBCgAGBQJVQqBvAAoJEFrbru/RghxvTcUH/2F0W7JHVRHVei7RQJKpjJO1
MLkk33lMxQIpd0Sr2tGTXEFOxrc3K1d7Xa4c5bMHuBALbzNFY8eYZWWHFlf3FOO/
lzHW9iU/Fe5YyS2IqZdMJERfhgMRldRLZ62qTHzDTsx2uEsxOFbb8y7EqPdJp7v+
L2TKFmNcPUyhvqsI9Cj8do7nGvUeUdQ4Iw3jjXssTPZ543NRsiPVK1AMwdqvm/WJ
Ew/ldnXcivMfjLgA6larhSgmBcLuGbTL+JwsRq9bDtxNFQwgOo7ILEtDIAy9rSdT
IOk+u2NeQLr5IyJ8cEOrKAxKGqiZP8s0yAI7PgruMXcZe1SSP9upAkdahXqSGW0=
=TXD+
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What happened to Tor's Bridges?

2015-04-30 Thread isis
michael ball transcribed 0.4K bytes:
 I'm having issues requesting bridges by email (from a gmail account).
 
 Hey, michaelballriseup!
 
 [This is an automated message; please do not reply.]
 
 Here are your bridges:
 
 (no bridges currently available)

Hello,

Thanks to both of you for pointing this out.  There is a known issue with the
BridgeAuthority causing this bug, see https://bugs.torproject.org/15866.  The
fix should be deployed soon.

Regards,
-- 
 ♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://blog.patternsinthevoid.net/isis.txt


signature.asc
Description: Digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is being detected to alert upon?

2015-04-30 Thread Allen
 a connection to a Tor bridge looks kind of like regular TLS traffic.

Question: I recompiled OpenSSL to remove a bunch of features that look
unnecessary and might present a security risk, such as SSL2, SSL3 and DTLS.
(In case it matters, it is OpenSSL v1.0.2a and the specific configure
options are no-ssl2 no-ssl3 no-idea no-dtls no-psk no-srp no-dso no-npn
no-hw no-engines -DOPENSSL_NO_HEARTBEATS -DOPENSSL_USE_IPV6=0).

I'm using this rebuilt DLL with Tor.  Does this compromise Tor's TLS
handshake so that it no longer looks like Firefox?  If so, what so I need to
do to allow Tor to mimic Firefox's TLS handshake?


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Gmail is blocking sending email from smtp.gmail.com

2015-04-30 Thread Akater
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Thanks. I haven't tried 2FA yet but without it, switching identities
seems to help: apparently, Gmail dislikes some exit nodes. Note: being
logged in via Tor browser didn't help.


-BEGIN PGP SIGNATURE-

iQEcBAEBCgAGBQJVQqY4AAoJEFrbru/Rghxv35cIAMxitW+4TaNaUUnyV2d3u0dv
4w/pklfVuPOPotMRZ0WnMdjp+6PajgW68BZkY5051KUgWCtUFdgZzrtykcg3Tr1t
C6zYzV4UtCuar1sOftEIrmbuBMKOlkhks8JWg5AQvMFvX9IiAPp7IlOqHrfEF42I
64w7sEp0HcZAvPcrDS1cikNesuYAxTnOGJZkihlpsy1LCs+wQ6t0e1HuSHpnm0s6
Vmi9w2efSBRGDh17uiJk7UHjD4eJ8Yht2kJh4Oc1X8Jw9IKBwT1Vkd0sPQ1UPUz4
CY/h4hAVi+0OGi11dGn2GN7lklUBFLouD0xwLHbEtfULY84jboJAZSNPRfqTwPU=
=03zY
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread benjamin barber
I think that maidsafe is what the OP really wants to look for, hosting
hidden services and traffic isn't free, maidsafe is a distributed cdn that
implements an altcoin.

On Thu, Apr 30, 2015 at 2:36 PM, Akater nuclearsp...@gmail.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512

 Thank you for this detailed exposition! Actually, I never gave any
 thought about how BT, being a distributed network itself, would
 interact with Tor---which was pretty stupid of me, since the flaw is
 quite obvious. My item c) should have been just you can't share heavy
 media content efficiently with Tor.


 -BEGIN PGP SIGNATURE-

 iQEcBAEBCgAGBQJVQqBvAAoJEFrbru/RghxvTcUH/2F0W7JHVRHVei7RQJKpjJO1
 MLkk33lMxQIpd0Sr2tGTXEFOxrc3K1d7Xa4c5bMHuBALbzNFY8eYZWWHFlf3FOO/
 lzHW9iU/Fe5YyS2IqZdMJERfhgMRldRLZ62qTHzDTsx2uEsxOFbb8y7EqPdJp7v+
 L2TKFmNcPUyhvqsI9Cj8do7nGvUeUdQ4Iw3jjXssTPZ543NRsiPVK1AMwdqvm/WJ
 Ew/ldnXcivMfjLgA6larhSgmBcLuGbTL+JwsRq9bDtxNFQwgOo7ILEtDIAy9rSdT
 IOk+u2NeQLr5IyJ8cEOrKAxKGqiZP8s0yAI7PgruMXcZe1SSP9upAkdahXqSGW0=
 =TXD+
 -END PGP SIGNATURE-
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Allen
 If you want anonymous transactions then you want a blind-signing based
currency like Taler  

Surely you jest...

From http://www.taler.net/governments

 Taler is an electronic payment system that was built with the goal of
supporting taxation. With Taler, the receiver of any form of payment is
known, and the payment information comes attached with details about what
the payment was made for. Thus, governments can use this data to tax
buisnesses and individuals based on their income, making tax evasion and
black markets less viable.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Felipe Micaroni Lalli
Hi!

Why not make a fully true integration with bitcoin in the network? Bitcoin
could be the fuel: who wants to use pays, who want to help the network with
a exit node receives, simple like that. The exit nodes could define a
minimum to receive, for example: 0.001 BTC / MB or 0.01 BTC / MB or for
free, and the user could define a maximum to pay, like 0.0005 BTC / MB or
even free. Then, the network would find the right matches / patches. In a
free market more you pay, more you get in speed and reliability. The
networks could continue free but slow and faster if paid.

Forget the intermediate nodes for now, think in this situation:

- A, B and C is final user.
- D, E and F are exit nodes.

A is poor and set his configuration to spend max of 0 BTC / MB.
B set max pend of 0.001 BTC / MB, and C is rich, so he set max to 0.01 BTC
/ MB.

D is a very nice guy, and rely a exit node for free. E has a few network
resources, so he set min. to 0.001 BTC / MB. F is even more poor, and he
wouldn't be a exit node anyway, so he set the min. to 0.01 BTC / MB.

A would use D as exit node, with the rate of 0 BTC / MB.
B would use D and E as exit node, with the avg. rate of 0.0005 BTC / MB.
C would use D, E and F as exit node, with the avg. rate of 0.00367 BTC / MB.

F won't earn too much because he is very expensive and few users would use
that. But E could make more money even charging less. The market will
decide the equilibrium.



Thanks!
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Jeff Burdges

On 30 Apr 2015, at 10:42, Aeris aeris+...@imirhil.fr wrote:
 who wants to use pays, who want to help the network with
 a exit node receives, simple like that
 So who wants to have anonymity must be rich ?
 Just no way :)

Worse, it’s a catastrophic weakening of the anonymity provided by Tor, as 
Bitcoin is only pseudonymous, not anonymous.

If you want anonymous transactions then you want a blind-signing based currency 
like Taler  http://www.taler.net/  as opposed to a blockchain based currency 
like BTC.  I’m not in favor of paying for Tor relays using even that for 
political reasons, but blind-signing is necessary to build a transaction model 
that’s no weaker than Tor.

Jeff

p.s. Leif talked about a proof-of-onion altcoin idea in which “mining” required 
fetching data through onion routing nodes determined by the spinning nonce, 
etc. and both the miner and any nodes forwarding data earned mining payouts.  
In this way, forwarding is paid for by the occasional fake mining circuits, not 
by users.  You need nodes to sign some traffic, which potentially creates new 
weaknesses, so not suitable for Tor.  It relevant if you’re trying to launch a 
different sort of onion routing network though, like maybe a high-bandwidth 
fail shortage/sharing network, as the coin speculators might help bolster the 
bandwidth and anonymity.




signature.asc
Description: Message signed with OpenPGP using GPGMail
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Ben Tasker
 The networks could continue free but slow and faster if paid.

Never thought I'd see a suggestion of paid fast lanes on Tor, thought that
was largely limited to the dreams of greedy ISPs

You'd probably attract more exit operators if it were possible to be paid,
but I'm not sure it'd be a good idea overall.



On Thu, Apr 30, 2015 at 3:42 PM, Aeris aeris+...@imirhil.fr wrote:

  who wants to use pays, who want to help the network with
  a exit node receives, simple like that

 So who wants to have anonymity must be rich ?
 Just no way :)

 --
 Aeris

 Protégez votre vie privée, chiffrez vos communications
 GPG : EFB74277 ECE4E222
 OTR : 922C97CA EC0B1AD3
 https://café-vie-privée.fr/ https://xn--caf-vie-prive-dhbj.fr/
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk




-- 
Ben Tasker
https://www.bentasker.co.uk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Full integration with bitcoin (suggestion / feature request)

2015-04-30 Thread Speak Freely
There are tons of problems with the suggestion, IMMHO.

Good read:
https://blog.torproject.org/category/tags/bitcoin

I have very strong reservations about anyone suggesting internet fast
lanes, or pay to play lanes.

I run my relays for everyone, equally. If someone is poor, that doesn't
mean they are any less important. For the purposes of Tor, chances are
poor people match more closely to Tor's project goals. Based entirely on
nothing but a guess, I would expect a poor person to be more willing, or
more inclined to be a whistle blower, or more interested in political
change, or more dedicated to social improvement, over a debutante
dilettante. A very well off white guy in middle America suburbia has
nothing to lose provided the status quo remains. A very poor person has
nothing to gain from the status quo, so would tend to try to improve
themselves, and others.

It would also introduce fascinating attack vectors, as it would be
relatively easy to determine who the poor people are vs who the rich
people are, based simply on what a particular relay charges for it's
service. The reduced anonymity set would present interesting problems.

Assuming your numbers, at today's rate, 0.001BTC would be $0.23USD/MB
($0.28 for us Canadians).
$0.23/MB@100GB/day = $23,000/day
$0.23/MB@3TB(100GB*30)/month = $690,000/month
That's a disturbingly good ROI, considering the cost for the operator
would be anywhere between $3-15/month.
(For a rich person to download a 1GB file, it would cost them $230.)


Finally, attempting to monetize a system that is currently free as in
beer, would not necessarily bring out the best in people. Sure, some
operators would run their relays for free, but many wouldn't. When
certain people realize that they could monetize the relay, what's to
stop them from sniffing the data to make even more money?


BUT, what do I know. Read the blog, it's much better written than my
gibberish regarding this topic.



Matt
Speak Freely

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What happened to Tor's Bridges?

2015-04-30 Thread michael ball
I'm having issues requesting bridges by email (from a gmail account).

Hey, michaelballriseup!

[This is an automated message; please do not reply.]

Here are your bridges:

(no bridges currently available)
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk