[tor-talk] Escape NSA just to enter commercial surveillance?

juan juan.g71 at gmail.com
Fri Jan 15 19:18:32 UTC 2016


On Thu, 14 Jan 2016 23:08:14 +0100
creo <creo-tor-lists at blackmesa.at> wrote:

> Am 2016-01-14 18:52, schrieb juan:
> 
> > Philipp Winter <phw at nymity.ch> wrote:
> > 
> >> Logging in to Facebook over Tor reveals your identity,
> >> but not your location.
> > 
> > any garden variety proxy achieves the same result.
> 
> No, it does not.

	Yes it does, unless the proxy server 'shares' information with
	facebook. 


> 
> You may be able to force the proxy operator to hand over your real
> IP address since they also have to comply to law and regulation
> based on the country they are operated in.

	facebook doesn't have yet an army or global 'jurisdiction'...

	now if you're talking about the criminals known as the 'US
	government'(who fund tor) that's of course a different story. 
> 

> Also, a proxy may be compromised.


	whereas tor is magically protected from compromise.
 

> Due to onion routing, suing a relay operator won't get you such
> information. Guard nodes know who is talking to them, but not where
> they're going. Exit nodes know the destination of the communication,
> but not who's the originator, and middle nodes are blessed with
> ignorance on both ends.


	I know all that. My point is that so onion routing isn't really
	needed if all you want it to hide your location from facebook
	or even from anybody else who can't threat to murder proxy
	operators like the US government(who fund tor) does. 



> It's dangerous to hint people to use proxies
> in order to get their locations hidden - their traces are just moved
> to another system, they're not gone.

	Ah yes. They are not magical like tor. 


	And of course it is not dangerous to promote tor, a system
	creted and controlled by the US military.


> 
> 
> - Daniel



More information about the tor-talk mailing list