[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #18361 [Tor Browser]: Issues with corporate censorship and mass surveillance
#18361: Issues with corporate censorship and mass surveillance
------------------------------------------+--------------------------
Reporter: ioerror | Owner: tbb-team
Type: enhancement | Status: new
Priority: High | Milestone:
Component: Tor Browser | Version:
Severity: Critical | Resolution:
Keywords: security, privacy, anonymity | Actual Points:
Parent ID: | Points:
Sponsor: |
------------------------------------------+--------------------------
Comment (by kbaegis):
> > Finally, I'd invite you to revisit the key point here, which is that
your product line makes Tor unusable by many users who still want to
browse the web anonymously. I understand that your company has a goal.
In this specific context, the busi ness goals are causing a legitimate
harm to web users and this is something that I suggest you revisit more
broadly within your organization. Surely !CloudFlare has technical
expertise that extends beyond "Let's fix that with captcha" and there are
probably (from an engineering perspective) better ways to solve both the
problems of DDoS and spam than authenticating every single session.
> >
> >
> >
>
> I agree with this. I've kicked off an internal discussion of the best
way to deal with the abuse coming from Tor (and elsewhere) that doesn't
involve CAPTCHAs. We'll continue with the other things listed above as I
want to have some immediate impact on this while in parallel looking for
better solutions.
I agree with Jacob here. The Tor community can likely give you unique
expertise if they're given a forum to do so. Currently, they had to open
a ticket to get your attention- hence the above discussion. I'd also
seriously look into how you are addressing DDoS from the network layer
(specifically your edge router/firewall/load balancing configurations),
how you scale your client infrastructure elastically, and specifically how
you define your threat model. Two subpoints: your own engineer has
admitted that captcha is a terrible way to address this problem, stating
"we struggle to even serve captchas." So I'd challenge that this is an
effective solution. Second, I'm with several others here seriously
questioning the SNR and throughput constraints around blanket allowance of
Tor infrastructure. It's like using a hatchet to remove a fly from your
friends forehead. Small problem, oblique solution.
>
>
>
> > I'll wrap up with a question. How are you intending on rolling out
this new feature? Is it going to be opt-in, opt-out, will there be an
email sent to your customers about using it? I think that this is
something that the community is greatly interested in.
> >
>
> Almost everything we announce goes on our blog so I imagine we'll do it
that way. It gets emailed to people who subscribe to the blog. I don't
know if it'll be emailed to all customers (mostly because we don't tend
to send them a lot of email and it's the mark eting group that decides).
The current plan is for this to be opt-in.
I think that this marginalizes the issue. Offering a feature that most
customers would have to voluntarily opt into and likely don't know about
(because they'd have to be looking for it to find it) is a waste of
everyone's time- particularly a CTO. If your goal is to find a solution,
this patently isn't it if it's going to be unannounced and opt-in.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18361#comment:103>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs