I've recently touted establishing a Tor exit node at the inaugural Boise organizing committee of the Democratic Socialists of America.
The idea was considered esoteric, but such anonymity craft is useful for activists of all stripes.
Too, performing artists (neo-burlesque, LGBTQ comics, etc.), punks and anarchists have also expressed interest in Tor.
I have been told that Tor is conceptually difficult to wrap your head around, but these are useful mission fields.
Hello Kenneth,
Kenneth Freeman:
I've recently touted establishing a Tor exit node at the inaugural Boise organizing committee of the Democratic Socialists of America.> The idea was considered esoteric, but such anonymity craft is useful for activists of all stripes.
Too, performing artists (neo-burlesque, LGBTQ comics, etc.), punks and anarchists have also expressed interest in Tor.
Thank you for running an exit relay. Anonymity is useful for all creatures. :)
I have been told that Tor is conceptually difficult to wrap your head around, but these are useful mission fields.
Any specifics on what is the conceptually difficulty to Tor?
Cheers, ~Vasilis
On 12/18/2017 12:15 PM, Vasilis wrote:
Hello Kenneth,
Thank you for running an exit relay. Anonymity is useful for all creatures. :)
Just a relay, but anonymity is needful.
I have been told that Tor is conceptually difficult to wrap your head around, but these are useful mission fields.
Any specifics on what is the conceptually difficulty to Tor?
The need to be anonymous, how to configure your threat model, and how the anonymity is provided by Tor. An LGBT kid has different gestalt than a cop or a whistle blower. Joe Six-Pack might just want to avoid ad tracking; a human rights activist might want to avoid being killed. Etc.
Hello,
I'd like to pick up on this. It is worth remembering that Tor itself is not conceptually difficult - it is an anonymizing network for TCP traffic that builds circuits across multiple nodes.
Tor does not care about the data. This is your responsibility. You need to ensure it does not transmit information that might be used to deanonymize you.
Most people think of this information as your IP address, but more subtle information can be used to build up a profile about you. Using Tor Browser is often essential for all the groups you mentioned, if their goal is anonymity while browsing the world wide web.
I think what you need to understand is that everyone judges risk differently, and some of them judge it badly. Some people refer to 'threat models', but this is considered by some to be a somewhat awkward term. In any case, judging risk would often involve considering certain scenarios, and a realistic idea of the capabilities of some adversary. The EFF have quite a good guide on judging risk, which I like: https://ssd.eff.org/en/module/assessing-your-risks
It's quite possible you don't really have an adversary. Some people do, but many people just want to protect themselves from routine internet surveillance. In any case, Tor Browser is probably still your best bet. Some people might consider a system like Tails to be desirable.
Therefore, I don't think there is anything conceptually difficult about understanding Tor. It is more about understanding peripheral issues which are more subtle. Fortunately, using Tor Browser effectively isn't as difficult as some would suggest, once one gets a basic idea of managing identities and the like.
All the best, Duncan
On 28 December 2017 11:55:29 CET, Kenneth Freeman kencf0618@riseup.net wrote:
On 12/18/2017 12:15 PM, Vasilis wrote:
Hello Kenneth,
Thank you for running an exit relay. Anonymity is useful for all creatures. :)
Just a relay, but anonymity is needful.
I have been told that Tor is conceptually difficult to wrap your
head
around, but these are useful mission fields.
Any specifics on what is the conceptually difficulty to Tor?
The need to be anonymous, how to configure your threat model, and how the anonymity is provided by Tor. An LGBT kid has different gestalt than a cop or a whistle blower. Joe Six-Pack might just want to avoid ad tracking; a human rights activist might want to avoid being killed. Etc.
On Fri, Dec 29, 2017 at 02:38:41AM +0100, Duncan wrote:
Hello,
I'd like to pick up on this. It is worth remembering that Tor itself is not conceptually difficult - it is an anonymizing network for TCP traffic that builds circuits across multiple nodes.
...for streams not TCP. Tor does not transport TCP, it transports streams. As it turns out TCP also transports streams as do UNIX domain sockets both of which can play nice with Tor via SOCKS protocol.
I think understanding Tor's adversary model is quite difficult. But then if you aren't describing any attacks then it might be easy to fall into a habit of considering it simple whereas it is not.
Tor does not care about the data. This is your responsibility. You need to ensure it does not transmit information that might be used to deanonymize you.
Most people think of this information as your IP address, but more subtle information can be used to build up a profile about you. Using Tor Browser is often essential for all the groups you mentioned, if their goal is anonymity while browsing the world wide web.
I think what you need to understand is that everyone judges risk differently, and some of them judge it badly. Some people refer to 'threat models', but this is considered by some to be a somewhat awkward term. In any case, judging risk would often involve considering certain scenarios, and a realistic idea of the capabilities of some adversary. The EFF have quite a good guide on judging risk, which I like: https://ssd.eff.org/en/module/assessing-your-risks
If you don't like the term threat model then try adversary model. That web page doesn't really even scratch the surface of Tor's adversary model but seems to be describing basic concepts of what an adversary model is.
It's quite possible you don't really have an adversary. Some people do, but many people just want to protect themselves from routine internet surveillance. In any case, Tor Browser is probably still your best bet. Some people might consider a system like Tails to be desirable.
Therefore, I don't think there is anything conceptually difficult about understanding Tor. It is more about understanding peripheral issues which are more subtle. Fortunately, using Tor Browser effectively isn't as difficult as some would suggest, once one gets a basic idea of managing identities and the like.
Disagree. Understanding the attacks on Tor is understanding Tor's adverary model. Merely describing how Tor is supposed to work is a good start but not really sufficient for a comprehensive adversary model. The Tor Project website has got a decent FAQ that I would refer people towards. And if wishing for a deeper understanding there are quite a few papers about Tor on anonbib, some of them describing attacks and defenses.
All the best, Duncan
On 28 December 2017 11:55:29 CET, Kenneth Freeman kencf0618@riseup.net wrote:
On 12/18/2017 12:15 PM, Vasilis wrote:
Hello Kenneth,
Thank you for running an exit relay. Anonymity is useful for all creatures. :)
Just a relay, but anonymity is needful.
I have been told that Tor is conceptually difficult to wrap your
head
around, but these are useful mission fields.
Any specifics on what is the conceptually difficulty to Tor?
The need to be anonymous, how to configure your threat model, and how the anonymity is provided by Tor. An LGBT kid has different gestalt than a cop or a whistle blower. Joe Six-Pack might just want to avoid ad tracking; a human rights activist might want to avoid being killed. Etc.
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays@lists.torproject.org