[tor-talk] Meeting Snowden in Princeton

benjamin barber barberb at barberb.com
Sun May 3 17:29:30 UTC 2015


forgive me for hurry typing.

On Sun, May 3, 2015 at 10:28 AM, benjamin barber <barberb at barberb.com>
wrote:

> Its already been discussed that VPN services and i2p are more secure for
> passing data unbeknownst to others, not even to mention the merits of the
> dir auths, and how they were being ddosed by lizard squad or were being
> seized.
>
>
> https://blog.torproject.org/blog/possible-upcoming-attempts-disable-tor-network
>
> AFAIK i have never heard the explanation behind the onymous arrests, but
> when the TOR leadership associates with Randi Harper and Lorrelai.
>
> In the end, we're all known by the company that we keep. Tor members seem
> to be making alot of ties to government and telecom, and associates with
> people like randi harper and lorrelai as well.
>
> Like i said in a previous thread, i was working on building tor hidden
> services, and now I no longer care to help tor at all, i'd rather wash my
> eyes with bleach, nice concept but wrong team and wrong implementation.
>
> On Sun, May 3, 2015 at 2:02 AM, coderman <coderman at gmail.com> wrote:
>
>> On 5/3/15, benjamin barber <barberb at barberb.com> wrote:
>> > Except that TOR says they're going to help LEO with stop cyber criminals
>> > according to briefings with UK parliament.
>>
>> what part of "Will never compromise Tor" do you not understand?
>> educating law enforcement does not equate to capitulating to calls for
>> backdoors or weaknesses.
>>
>> when the control port flaw was disclosed, a patch was committed within
>> 8 hours - while Tor people were on the road at a security conference.
>> this is a record turn-around for any defect i have been involved with.
>> in terms of technical measures for security, Tor has a great track
>> record - even compared to projects with ten times their resources.
>>
>>
>>
>> > Thats not to mean that Tor is a government honeypot but its not secure
>> > enough, but if the government makes tor popular people will not be
>> > persuaded to more effective models.
>>
>> Tor _is_ the most effective model deployed. there are a great many
>> ideas about making it even better, and i don't see how Tor being
>> popular precludes making it better.
>>
>> take a look at the datagram Tor related research to see just how
>> difficult / complicated some of these problems are.
>>  (userspace stacks, congestion controls, padding and reordering, etc... )
>>
>> pro-active security posture, prompt resolutions to serious security
>> issues, attentive to new research and actively engaged with
>> educational and professional organizations.
>>
>> any of these aspects speak well of Tor itself and the Tor Project around
>> it.
>>
>> perhaps disagreement based in technical merit should have been
>> requested. do you have any?
>>
>>
>> best regards,
>> --
>> tor-talk mailing list - tor-talk at lists.torproject.org
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
>
>


More information about the tor-talk mailing list