[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity
On Fri, 27 Jun 2014 13:48:27 -0700
coderman <coderman@xxxxxxxxx> wrote:
> On Fri, Jun 27, 2014 at 11:38 AM, Juan <juan.g71@xxxxxxxxx> wrote:
> >...
> > And so we have amusing tor lackeys like ¨coderman¨
> > parroting propaganda that not even the tor developers
> > themselves believe.
>
> this is amusing! explain to me where i've said Tor resists traffic
> analysis? :)
As I already mentioned, you and others talk as if that were the
case. As a matter of fact you are doing it again in this
(previous) message of yours.
>
> my point is that Tor is harder than the software you're using over it.
That is just a generality, a half truth, and not relevant in
this context. It is an excuse and a distraction.
> web browsers, instant messaging clients, web services and poorly
> implemented applications.
>
> why do you need traffic analysis when trivial attacks work just as
> well?
I dont need traffic analysis, I am not a government nazi.
However, government nazis do need traffic analysis to
deal with people who correctly configure their servers.
It shouldnt be necessary for me to point out such obvious
fact?
Also, if attacks against servers are ´easy´,
why did it take years for the government to get freedom
hosting?
>
>
>
> > So, how did the american gestapo get freedom hosting and
> > silk road? Traffic analysis.
>
> citation needed. all signs point to insider threat (you know, rats)
Citation needed? What kind of citation? I make my case based on
basic, correct reasoning and public information. And you have
nothing to counter it.
And what are *you* doing? Are you indeed parroting the
official story? Are you that ´naive´?
> all signs point to insider threat (you know, rats)
So, wheres **your** evidence for that parallel story?
>
>
>
> > https://en.wikipedia.org/wiki/Parallel_construction
>
> we could have a long discussion on this subject, but not apropos to
> this list...
What? You dont want to discuss how fuckingly corrupt the US
government is in a list that belongs to the US government?
You dont want to discuss the fact that the american ´justice´
system is based on blatant lies and that they even have a
procedure in place to manage those blatant lies?
tsk tsk tsk
And, au contraire, the discussion is 100% a propos this mailing
list.
See, you are basing your baseless defence of Tor (US
military project) on lies from the US government, lies which in
turn can be traced to so called ¨parallel contstruction¨.
>
>
> best regards,
>
>
>
> TL;DR: Tor is not the weak spot in your privacy.
Baseless assertion.
> OPSEC, application
> attack surface, pervasive information insecurity - these are all going
> to betray you before some fundamental vulnerability in Tor protocol.
False, baseless assertion. Notice again how you fail to
specify the ´threat model´, to use your military jargon.
You are not explicitly saying that tor resists traffic
analysis, but you are saying something that amounts to the same
thing - that traffic analysis doesnt matter.
J.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk