Matthew Finkel: > I agree, and I think it's safe to assume that some nation-state > adversaries do not have these capabilities yet. Users should choose > obfs3 over obfs2, but if a user has a reason for requesting obfs2 then > I don't think we should deny them. But aren't âweâ the expert on the topic? Which reasons do you think a user might have to choose obfs2 over obfs3? Isn't it in an attacker interest to trick users into using obfs2? Should all HTTPS websites allow DES because users might have a reason to request it? Should OTR clients continue to support OTRv1 because users might a have a reason to request itÂ[1]? Sorry, but as a fail to see good reasons, I just don't get the logic. For the Tor Browser, we stop even distributing the binaries as soon as a new version is out because we know the previous one to be insecure. Why should a broken protocol still be advertised? Why should addresses of insecure bridge still be distributed when we can just avoid them? What do users get out of retrieving obfs2 bridge addresses that they can't get when retrieving obfs3? What does the Tor Project get when misleading users? [1]: https://bugs.debian.org/725779 -- Lunar <lunar@xxxxxxxxxxxxxx>
Attachment:
signature.asc
Description: Digital signature
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev