What is the response to this news? http://www.kaspersky.com/about/news/virus/2014/Number-of-the-week-an-average...
This is old news, not news in general, and has been well covered in the list archives for the year to date [1]. Anonymous networks can and will be used for both good and bad. To ensure the good within any network, you must accept some bad. We believe the good outweighs the bad. So enjoy that some precious and valuable anonymity exits in the world, and/or quit trolling.
[1] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Thanks,
I was about to write pretty much the same.
What is the response to this news? http://www.kaspersky.com/about/news/virus/2014/Number-of-the-week-an-average...
This is old news, not news in general, and has been well covered in the list archives for the year to date [1]. Anonymous networks can and will be used for both good and bad. To ensure the good within any network, you must accept some bad. We believe the good outweighs the bad. So enjoy that some precious and valuable anonymity exits in the world, and/or quit trolling.
[1] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tor hidden services – a safe haven for cybercriminals https://www.securelist.com/en/blog/8187/Tor_hidden_services_a_safe_haven_for...
The inevitable move - 64-bit ZeuS has come enhanced with Tor https://www.securelist.com/en/blog/208214171/The_inevitable_move_64_bit_ZeuS...
ChewBacca - a new episode of Tor-based Malware https://www.securelist.com/en/blog/208214185/ChewBacca_a_new_episode_of_Tor_...
The first Tor Trojan for Android https://www.securelist.com/en/blog/8184/The_first_Tor_Trojan_for_Android
On Sat, Mar 08, 2014 at 05:03:32PM -0800, beatthebastards@inbox.com wrote 1.0K bytes in 0 lines about: : Tor hidden services – a safe haven for cybercriminals : The inevitable move - 64-bit ZeuS has come enhanced with Tor : ChewBacca - a new episode of Tor-based Malware
Replace the word "Tor" with "TCP/IP" and you can re-live the computer news headlines of the 1990s.
Replace the word "Tor" with "peer to peer" and you can re-live the computer news headlines of the 2000s.
On Sunday 09 March 2014 14:02:39 Andrew Lewman wrote:
On Sat, Mar 08, 2014 at 05:03:32PM -0800, beatthebastards@inbox.com wrote
1.0K bytes in 0 lines about:
: Tor hidden services – a safe haven for cybercriminals : The inevitable move - 64-bit ZeuS has come enhanced with Tor : ChewBacca - a new episode of Tor-based Malware
Replace the word "Tor" with "TCP/IP" and you can re-live the computer news headlines of the 1990s.
Replace the word "Tor" with "peer to peer" and you can re-live the computer news headlines of the 2000s.
Though you are right to some extent, I think one has to distinguish between Tor and Tor hidden services. While Tor has it's socially laudable applications, the vast majority of Tor hidden service usage are in fact not. I would even go one step further and say: If hidden service usage does not change drastically, it would be better for Tor's credibility to remove the hidden service code base. But I am open for discussion on that.
Best, Robert
I am pretty sure the answer is "NO", but is there a way to "enhance" Tor in such a way that a relay that does not host hidden services can also choose not to carry traffic for hidden services? That way those who want to use hidden services can do so by using more limited subset of the Tor network at the risk of less anonymity, I suppose. I am not sure how it would work as it seems the client chooses the relays.
On 03/09/2014 11:17 AM, ra wrote:
On Sunday 09 March 2014 14:02:39 Andrew Lewman wrote:
...
Though you are right to some extent, I think one has to distinguish between Tor and Tor hidden services. While Tor has it's socially laudable applications, the vast majority of Tor hidden service usage are in fact not. I would even go one step further and say: If hidden service usage does not change drastically, it would be better for Tor's credibility to remove the hidden service code base. But I am open for discussion on that.
Best, Robert
On Sun, Mar 09, 2014 at 12:21:11PM -0400, Tora Tora Tora wrote:
I am pretty sure the answer is "NO", but is there a way to "enhance" Tor in such a way that a relay that does not host hidden services can also choose not to carry traffic for hidden services? those who want to use hidden services can do so by using more limited subset of the Tor network at the risk of less anonymity, I suppose. I am not sure how it would work as it seems the client chooses the relays.
That would break sites such as DuckDuckGo which provide a hidden service for searches. Providing such a service is the most anonymous way to offer service to Tor users; it defeats the malicious exit node problem and many traffic analysis attacks.
Like TCP/IP or any other tool, hidden services can be used for malicious purposes, but they can also be used for good.
-andy
On 14-03-09 11:17 AM, ra wrote:
...I think one has to distinguish between Tor and Tor hidden services. While Tor has it's socially laudable applications, the vast majority of Tor hidden service usage are in fact not.
Could you cite some references for this statistic?
On Monday 10 March 2014 13:32:31 krishna e bera wrote:
Could you cite some references for this statistic?
Content and popularity analysis of Tor hidden services July 29, 2013 Alex Biryukov Ivan Pustogarov Ralf-Philipp Weinmann
http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf
Best, Robert
tor-relays@lists.torproject.org