[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] anonabox : the Tor hardware router
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 11/13/2014 10:45 AM, Derric Atzrott wrote:
>
>> If my bank, for example, sees
>> Tor IPs, it might freeze my account. And that's a _good_ thing.
>
> I disagree. I'd rather have more people using Tor even for things
> where identity is an essential part of authenticating you, like a bank.
>
*** Seconded. Even if you want your bank to authenticate you, I see no
good in having your bank knowing where you are, what you do, all the
time. I have a counter-example now, a friend of mine escaped conviction
for murder because of a credit card transaction demonstrating he was
somewhere else when the murder took place.
Black and white are a weak approximation. A weak approximation doesn't
survive a reality check. There are indeed two aspects to consider: one
is that using Tor for non-anonymity-critical aspects provides both more
stress on the infrastructure, and more cover traffic for people who
actually need the anonymity; two, more Tor users mean more Tor
infrastructure cost. Those are two correlated issues, but need to be
considered separately, otherwise you fall into the trap of using Tor
selectively, where the goal would rather be to use Tor in every occasion
so that global surveillance is much harder. If that goal seems too
extreme, it doesn't matter: the natural growth of Tor usage makes the
argument stand for itself. You cannot prevent users from using Tor for
any purpose (freedom 0), not only because the license says so, but also
because it's a fact: are you going to spy on Tor users to determine what
is legitimate or not?
More usage will bring more infrastructure cost: that has to be
addressed, because the Tor network is relatively dependent on U.S.
military budget. Not that I appreciate those bucks go into Tor rather
than in Gaza or Ferguson. But you get the picture: don't put all your
eggs in the same basket.
>>
>> Well, I gather that there's currently a surplus of non-exit relays and
>> bandwidth. So specifically they should contribute exit relays. That's
>> not so easy, however, and there's far too little support for it from the
>> Tor Project, in my (albeit limited) experience.
>
> This is definitely a problem that I would love to see worked on some.
>
*** Indeed, more exit relays would be great. And router projects that
incorporate Tor can be a great way to add a plethora of them. Except
maybe having a plethora of low-bandwidth exit nodes is not so
attractive. I would also love to see more exit nodes.
==
hk
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=i2D7
-----END PGP SIGNATURE-----
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk