Hello,

I'd like to pick up on this. It is worth remembering that Tor itself is not conceptually difficult - it is an anonymizing network for TCP traffic that builds circuits across multiple nodes.

Tor does not care about the data. This is your responsibility. You need to ensure it does not transmit information that might be used to deanonymize you.

Most people think of this information as your IP address, but more subtle information can be used to build up a profile about you. Using Tor Browser is often essential for all the groups you mentioned, if their goal is anonymity while browsing the world wide web.

I think what you need to understand is that everyone judges risk differently, and some of them judge it badly. Some people refer to 'threat models', but this is considered by some to be a somewhat awkward term. In any case, judging risk would often involve considering certain scenarios, and a realistic idea of the capabilities of some adversary. The EFF have quite a good guide on judging risk, which I like: https://ssd.eff.org/en/module/assessing-your-risks

It's quite possible you don't really have an adversary. Some people do, but many people just want to protect themselves from routine internet surveillance. In any case, Tor Browser is probably still your best bet. Some people might consider a system like Tails to be desirable.

Therefore, I don't think there is anything conceptually difficult about understanding Tor. It is more about understanding peripheral issues which are more subtle. Fortunately, using Tor Browser effectively isn't as difficult as some would suggest, once one gets a basic idea of managing identities and the like.

All the best,
Duncan


On 28 December 2017 11:55:29 CET, Kenneth Freeman <kencf0618@riseup.net> wrote:


On 12/18/2017 12:15 PM, Vasilis wrote:
Hello Kenneth,

Thank you for running an exit relay.
Anonymity is useful for all creatures. :)

Just a relay, but anonymity is needful.

I have been told that Tor is conceptually difficult to wrap your head
around, but these are useful mission fields.

Any specifics on what is the conceptually difficulty to Tor?

The need to be anonymous, how to configure your threat model, and how
the anonymity is provided by Tor. An LGBT kid has different gestalt than
a cop or a whistle blower. Joe Six-Pack might just want to avoid ad
tracking; a human rights activist might want to avoid being killed.
Etc.