[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [tor-talk] Meeting Snowden in Princeton
Its already been discussed that VPN services and i2p are more secure for
passing data unbeknownst to others, not even to mention the merits of the
dir auths, and how they were being ddosed by lizard squad or were being
AFAIK i have never heard the explanation behind the onymous arrests, but
when the TOR leadership associates with Randi Harper and Lorrelai.
In the end, we're all known by the company that we keep. Tor members seem
to be making alot of ties to government and telecom, and associates with
people like randi harper and lorrelai as well.
Like i said in a previous thread, i was working on building tor hidden
services, and now I no longer care to help tor at all, i'd rather wash my
eyes with bleach, nice concept but wrong team and wrong implementation.
On Sun, May 3, 2015 at 2:02 AM, coderman <firstname.lastname@example.org> wrote:
> On 5/3/15, benjamin barber <email@example.com> wrote:
> > Except that TOR says they're going to help LEO with stop cyber criminals
> > according to briefings with UK parliament.
> what part of "Will never compromise Tor" do you not understand?
> educating law enforcement does not equate to capitulating to calls for
> backdoors or weaknesses.
> when the control port flaw was disclosed, a patch was committed within
> 8 hours - while Tor people were on the road at a security conference.
> this is a record turn-around for any defect i have been involved with.
> in terms of technical measures for security, Tor has a great track
> record - even compared to projects with ten times their resources.
> > Thats not to mean that Tor is a government honeypot but its not secure
> > enough, but if the government makes tor popular people will not be
> > persuaded to more effective models.
> Tor _is_ the most effective model deployed. there are a great many
> ideas about making it even better, and i don't see how Tor being
> popular precludes making it better.
> take a look at the datagram Tor related research to see just how
> difficult / complicated some of these problems are.
> (userspace stacks, congestion controls, padding and reordering, etc... )
> pro-active security posture, prompt resolutions to serious security
> issues, attentive to new research and actively engaged with
> educational and professional organizations.
> any of these aspects speak well of Tor itself and the Tor Project around
> perhaps disagreement based in technical merit should have been
> requested. do you have any?
> best regards,
> tor-talk mailing list - firstname.lastname@example.org
> To unsubscribe or change other settings go to
tor-talk mailing list - email@example.com
To unsubscribe or change other settings go to