[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #18361 [Tor Browser]: Issues with corporate censorship and mass surveillance
#18361: Issues with corporate censorship and mass surveillance
------------------------------------------+--------------------------
Reporter: ioerror | Owner: tbb-team
Type: enhancement | Status: new
Priority: High | Milestone:
Component: Tor Browser | Version:
Severity: Critical | Resolution:
Keywords: security, privacy, anonymity | Actual Points:
Parent ID: | Points:
Sponsor: |
------------------------------------------+--------------------------
Comment (by cypherpunks):
See responses inline.
Replying to [comment:23 jgrahamc]:
>
> ''Using CF as an example - they do not appear open to working together
in open dialog,''
>
> Really? We've had multiple contacts with people working on TOR through
events like Real World Crypto and have been trying to come up with a
solution that will protect web sites from malicious use of TOR while
protecting the anonymity of TOR users (such as myself).
Yes, really.
> We rolled out special handling of the TOR network so that users should
not see a CAPTCHA on a circuit change.
This has never worked, and I say that as someone who uses the Tor Browser
Bundle every day.
>We also changed the CAPTCHA to the new one since the old was serving very
hard to handle text CAPTCHAs to TOR users.
You should know that the CAPTCHA still works about 1 in 20 times in my
experience, and that hasn't changed at all after you switched to the "new
one."
> The crypto guys who work for me are interested in blinded tokens as a
way to solve both the abuse problem and preserve anonymity.
That's nice but you're still completely censoring my use of your
customer's websites all day every day.
> I ran the program today and have data on 1,057 exit nodes showing that
Project Honeypot marks 710 of them as a source of comment spam (67%) with
567 having a score of greater than 25 (in the Project Honeypot terminology
meaning it delivered at least 100 spam messages) (54%). Over time these
values have been trending upwards. I've been recording the Project
Honeypot data for about 13 months that the percentage of exit nodes that
were listed as a source of comment spam was about 45% a year ago and is
now around 65%.
This is not a relevant fact for the vast majority of users whose right to
read your company infringes on.
>
> So, I'm interested in hearing about technical ways to resolve these
problems. Are there ways to reduce the amount of abuse through TOR? Could
TorBrowser implement a blinded token scheme that would preserve anonymity
and allow a Turing Test?
You clearly don't understand the clearly articulated problem as it as
described, and if you expect people to solve your team's inability to
implement a censorship system, I hope you find the help you need.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18361#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs