-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Well the topic has come up several times in the last day or two on IRC and generally the feeling is that it may be quite bad for the users of the product, not necessarily the Tor network however.
One thing that AnonBox does do is increase Tor network traffic - you can see this as both good and bad since it adds load to exit operators like myself which are already in short supply and diversity, but at the same time adding traffic to the network makes it safer to use for everyone.
The real concern is the mismarketing and borderline fraud occuring by assuming the simple use of a protocol or open source software (which I note, the hardware is not actually open source at all). In addition, the users of such a system are going to be leaving an enormous browser fingerprint and their activities will be correlated so expectation of reasonable privacy from this project is a misguided hope at best; at worst very dangerous to life and limb of anyone who relies on Tor for their life.
I am personally hoping somebody high up in the Tor Project management will openly condemn this atrocity and hopefully Kickstarter and the funders will withdraw their funds before a whole load of people buy into this "security as a tool" idea.
- -T
On 15/10/2014 12:15, Sven Reissmann wrote:
Hi there,
I recently read about the anonbox project [1], a small hardware-router, which allows end-users to connect their whole LAN to the Tor network. The project is on kickstarter at the moment [2].
Has there already been a discussion on how this might affect the performance of the Tor network?
Regards, Sven.
[1] http://anonabox.com [2] https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-ro...
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays