Hi All!

There are a bunch of security features which Onion sites provide and which make 
them very attractive from a systems and network security point of view; other 
folk in this thread have expounded upon many of these and their alternatives - 
the E2E-ness, the MITM-resistance, the lack of exit-node contention, etc - and 
I don’t wish to repeat their efforts.

Beyond all these, though, I should quote the original posting* which we made on 
the matter, which explains a simpler and less technical point: people access 
Facebook over Tor, and they will continue to do so, and their doing so is 
entirely valid.

The purpose of the Facebook Onion site, atop all the other security benefits 
which Tor affords, is simply to provide a better experience to these people.

That’s all.  Plus, a fringe benefit has been massive increase in awareness of 
Tor amongst our Engineering team.  :-)

    - a


* 
https://www.facebook.com/notes/facebook-over-tor/making-connections-to-facebook-more-secure/681898341916889
 
<https://www.facebook.com/notes/facebook-over-tor/making-connections-to-facebook-more-secure/681898341916889>
—
Alec Muffett
Security Infrastructure
Facebook Engineering
London

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to