[tor-relays] Anonbox Project

Thomas White thomaswhite at riseup.net
Wed Oct 15 12:00:47 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Well the topic has come up several times in the last day or two on IRC
and generally the feeling is that it may be quite bad for the users of
the product, not necessarily the Tor network however.

One thing that AnonBox does do is increase Tor network traffic - you
can see this as both good and bad since it adds load to exit operators
like myself which are already in short supply and diversity, but at
the same time adding traffic to the network makes it safer to use for
everyone.

The real concern is the mismarketing and borderline fraud occuring by
assuming the simple use of a protocol or open source software (which I
note, the hardware is not actually open source at all). In addition,
the users of such a system are going to be leaving an enormous browser
fingerprint and their activities will be correlated so expectation of
reasonable privacy from this project is a misguided hope at best; at
worst very dangerous to life and limb of anyone who relies on Tor for
their life.

I am personally hoping somebody high up in the Tor Project management
will openly condemn this atrocity and hopefully Kickstarter and the
funders will withdraw their funds before a whole load of people buy
into this "security as a tool" idea.

- -T

On 15/10/2014 12:15, Sven Reissmann wrote:
> Hi there,
> 
> I recently read about the anonbox project [1], a small
> hardware-router, which allows end-users to connect their whole LAN
> to the Tor network. The project is on kickstarter at the moment
> [2].
> 
> Has there already been a discussion on how this might affect the 
> performance of the Tor network?
> 
> Regards, Sven.
> 
> 
> [1] http://anonabox.com [2] 
> https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router
>
> 
> 
> 
> _______________________________________________ tor-relays mailing
> list tor-relays at lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
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=SX0h
-----END PGP SIGNATURE-----


More information about the tor-relays mailing list