[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Reduce hops when privacy level allows to save Tor network bandwidth
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Reduce hops when privacy level allows to save Tor network bandwidth
- From: Gregory Maxwell <gmaxwell@xxxxxxxxx>
- Date: Tue, 17 Nov 2009 09:58:23 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Tue, 17 Nov 2009 09:58:27 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type; bh=MCjRnNOXnXcSFyz9VvR2dtudsm3ck9fonYBDw9nKcas=; b=WHhFuIVvtG+q0HFnzWloqH6fYa80FuvBjJ6cYvle8ZI0d/SgNLMUZZEuKp4ibK4TWK f6BNA4SHL3t4kMXKHwXKKRd/sm1vfsb7K66EEyXukFEx2XNCOIhTqx/qcGAvgcWnwmJS UlhC+8MQ7+DFRvrt5RRItJkFPcu/BD6MR6gjM=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=sTUdMP3SvhghJU6mc/SUSjUjzpNW9l5jJcPb+SSM30zLuL/adKZgygZs/ODFJiGno0 XivH3Y4jO4fIf1DoLF918YXE0fGErjP1f8K8zljudKsaeysR93C8fwyq9uGogMPYC7xd 3zrbKtZTol97ZtQNlN2mQkg3Kh4va74pLUDxg=
- In-reply-to: <4B02AD3E.6030602@xxxxxxxxxxxxxx>
- References: <4b02abc1.48c3f10a.3ff9.ffffcfb6@xxxxxxxxxxxxx> <4B02AD3E.6030602@xxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On Tue, Nov 17, 2009 at 9:03 AM, Andrew Lewman <andrew@xxxxxxxxxxxxxx> wrote:
> People who don't want strong anonymity should use VPNS, single-hop proxy
> providers, or setup an ssh tunnel somewhere.
I thought there were plans to offer officially offer a length-two mode?
In particular the current routing is annoying for hidden nodes and
exit enclaves as they get an extra hop.
The alternatives you suggest have advantages including improved
performance, decreased probability of being blocked, less load on the
TOR network, and possibly lower chances of funny business by unethical
exit operators.
But the user loses an opportunity to contribute to the TOR anonymity
set and further pigeonholes TOR into niche, borderline, and outright
socially harmful use cases.
There are a great many people who have merely encountered one too many
examples of the ubiquitious tracking on the Internet. For example,
Google's abuse of JS fake out the link target display and intercept
outbound links on search has been driving me nuts lately as it makes
it impossible to copy and paste links from the search results. This
makes me aware of and irritated by Google's surveillance. If I take
up using TOR in response, I add to the anonymity set, I add to the
justifiable use cases, and I add a voice against inhibiting TOR
(either governmental inhibition or internet site operators blocking it
because its a frequent source of problem users).
I'd expect the performance impacts of casual users to be
self-limiting: People who don't really need TOR's properties are the
first to turn it off as it becomes slower.
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/