[tor-bugs] #5501 [TorBrowserButton]: enable Do-Not-Track DNT by default
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Thu Mar 29 03:08:36 UTC 2012
#5501: enable Do-Not-Track DNT by default
------------------------------+---------------------------------------------
Reporter: cypherpunks | Owner: mikeperry
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: TorBrowserButton | Version:
Keywords: | Parent:
Points: | Actualpoints:
------------------------------+---------------------------------------------
Comment(by mikeperry):
Replying to [comment:5 cypherpunks]:
> > DNT is not just a statement. It's a regulatory nightmare waiting to
happen, and what it means depends upon user behavior, website features,
and a whole lot of site-specific user consent.
> >
>
> For example, for google mail it would mean: "Do not scan their mails. Do
not offer personalized advertisements. Use generic advertisements.".
I have a hard time believing that this is a substantial privacy
improvement. Consider when a user reads my mail to them if I have this
header set and they don't: they still get targeted based on the fact that
they correspond with me and what we talk about is logged and datamined on
their side. If we both use different webmail services, there is no way to
communicate my DNT email preference to their email provider.
So, we could play all sorts of endless policy gymnastics and also to try
find a cross-protocol way to communicate DNT on the engineering end, or we
could just decide that we're cypherpunks damnit, and we're here to do this
stuff right.
In other words, this is a problem that should be solved by end to end
email encryption. There is a cost to making end to end encryption
accessible and understandable to the general public. Accepting DNT is
admitting that society doesn't want to pay that cost (because we'd rather
track you) and we want to turn a blind eye to tracking rather than solve
it.
> > If we can't solve privacy preferences with technological solutions
that prevent data disclosure in the first place, we're not trying hard
enough.
>
> We try the technological and the political way at the same time. DNT is
a political statement.
I worry it says we accept the political solution at the expense of the
technical.
> Right now [DNT is] too new. It doesn't make a difference right now. It's
a signal. Not using the signal is like not going to election, "my voice is
insignificant".
No, for us refusing DNT says "We refuse to trust the infrastructure."
> While normal users turning on DNT can be tracked even better due to DNT,
Tor is significant and can send a signal (all Tor users share it).
I am sure the advertising world will hear our signal independent of DNT. I
have no doubts about that.
> > In the worst case it means facebook/gmail says "Sorry, you can't do
that, you don't want to be tracked." Then the user is forced to disable
the header globally (and incur the fingerprinting penalty globally), just
to use a site-specific service.
>
> That is great! Imagine all the protests, people quitting facebook and
facebook offering better privacy, less tracking.
Look, either you trust facebook or you don't. I think pretending that
$facebook (or their extra-judicial non-US ad partners who aren't subject
to DNT) would obey the DNT header in the face of subpoena, coercion, or
compromise is just crazy. At the very least, they have audit logs. Those
logs are available to anyone who can extensively compromise US corporate
infrastructure. Since this adversary group includes Adrian Lamo along with
most levels of the Chinese Govt, I don't think we have a serious threat
model without employing end to end encryption *inside* of the
communication channels of services like facebook.
> It adds and political statement, which is more likely to be counted,
than counting how many people have Tor IP's.
Oh don't worry, we'll be heard before this is over.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5501#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list