Thus spake Seth David Schoen (schoen@xxxxxxx): > Eva Galperin and I worked on this graphic (drawn by Hugh D'Andrade) > that tries to show the difference between the threats Tor addresses > and the threats HTTPS addresses. > > https://www.eff.org/deeplinks/2012/03/https-and-tor-working-together-protect-your-privacy-and-security-online > > The complete interactive version is at > > https://www.eff.org/pages/tor-and-https This is a really awesome graphic and instructional tool. I just wanted to point out a couple things that may or may not actually matter: 1. Technically, the NSA, site.com, site.com's ISP, and the subpoena trifecta all see that you're using Tor to connect to site.com. We don't try to hide this fact, but new users are often surprised and frustrated by it. Perhaps "Tor" should be added to their infoboxes? 2. In a slightly more detailed version of the graphic that we might want to create for training purposes, we could also add a "Bridge" button and an "Obfsproxy" button. The "Bridge" button would change "Tor" to "Tor?" at the Hacker and user's ISP and maybe the NSA. The "Obfsproxy" button would remove "Tor" from those points (due to protocol obfuscation). 3. I agree with the Raccoon that the NSA's data sharing link is most accurately described as "Uncertain". Maybe the fact that there's two of them with separate info already conveys that? Hard to say. -- Mike Perry
Attachment:
signature.asc
Description: Digital signature
_______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk