[OT] another proxy, but not open source :-(

Aplin, Justin M jmaplin at ufl.edu
Tue May 25 09:55:34 UTC 2010


On 5/25/2010 4:59 AM, Scott Bennett wrote:
>       You may well be assuming too much.  It's not easy to know at this
> point because it's still undocumented vaporware.  I still think the
> whole thing smacks of being a honeypot for gullible humans.
>    

I'll admit I could be totally off base. But it's 5 in the morning and I 
honestly can't think of another way they could implement what they're 
trying to do (effectively, anyway) without an enormous infrastructure. 
Cheapest way to create one seems to be distributing your free software 
and having your users act as... oh wait, somebody thought of that already!

>       Well, that, at least, happens all the time.  How many installations
> of Windows Server 200[38] would you guess there are, for example?
>    

Maybe I've been out of the game for too long, but in my experience 
proprietary software is used either because it works well, or because it 
comes with support (i.e. insurance). The Windows servers, for example, 
work well in corporate environments running a large number of Windows 
machines in a Domain, and often said corporation will purchase support 
to go with it. It's worth the cost to keep things running (somewhat) 
smoothly. If you have a free alternative that works just as well and can 
be maintained by your staff without too much ado, odds are it will be 
used. Apache on *nix comes to mind as one example, as opposed to IIS.

So if we have two free softwares, one open-source and one closed-source, 
neither with any *explicit* support, the choice is going to come down to 
which one works better, and which one looks better. If they put out a 
crappy product, odds are it'll get uninstalled by the majority of users 
who just don't want to bother fucking with it. If it's a decent product, 
however, and it has a decent UI, and their production team can keep up 
with releases and bugfixes and whatnot, we may be in for some viable 
competition. We'll see. Somehow I doubt it.

>       China has done that at least once already.  They apparently managed
> to get ~80% of what the bridge authorities had at the time, IIRC.  Yet
> the remainder continued to operate and serve many people in China during
> that time.  And bridges come and go, just like ordinary relays.  Many
> are on dynamically assigned IP addresses, so their addresses change,
> thereby invalidating those data in the Chinese government's list.
>    

The picture in my head reminds me of this, for some reason: 
http://xkcd.com/350/

>> I am a tad unnerved at the number of links to the donation page,
>> though I appreciate the costs associated with such an endeavor.
>>
>>      
>       Indeed.
>    

As an aside, they do have a shiny-looking website, and I won't pretend 
users aren't attracted to that. We could do with a little shininess 
ourselves. Still though, pandering for donations when you're not even 
offering any sort of product or service... honeypot indeed.

~japlin

***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list