Delivery-Date: Fri, 24 Apr 2015 00:09:05 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 1D87F1E0AD6
	for <archiver@seul.org>; Fri, 24 Apr 2015 00:09:03 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 32D3F34F1F;
	Fri, 24 Apr 2015 04:08:59 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id F350034EF8
 for <tor-talk@lists.torproject.org>; Fri, 24 Apr 2015 04:08:55 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id CM2gXrXXM3MT for <tor-talk@lists.torproject.org>;
 Fri, 24 Apr 2015 04:08:55 +0000 (UTC)
Received: from mail.bitmessage.ch (mail.bitmessage.ch [146.228.112.252])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 8815B34DED
 for <tor-talk@lists.torproject.org>; Fri, 24 Apr 2015 04:08:55 +0000 (UTC)
dkim-signature: v=1; a=rsa-sha256; d=bitmessage.ch; s=mail;
 c=relaxed/relaxed; q=dns/txt;
 h=From:Subject:Date:Message-ID:To:MIME-Version:Content-Type:Content-Transfer-Encoding:In-Reply-To:References;
 bh=fyMfMiO2ao4H20SHgnfxAXyzhrp2daG+ODw4uyR2GcM=;
 b=FLaANcGodGxUo0rTA7gzO9bdvcLAXVYQtlwyN23Jmu0REOHVC1ooVL8I4nPT/AyhWc/yRf77JM/rlD8gguZtuuui6IwQU4Z/BJkkOF16fcNKiesR+o8semjcEy7kDNo+4IsQgG2uGMNBCcRkr2EC+wDcG+a5mQo0gdjvxtwQ1xc=
Received: from 127.0.0.1 (BITMESSAGE [127.0.0.1])
 by mail.bitmessage.ch with ESMTPSA
 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128)
 ; Fri, 24 Apr 2015 05:37:35 +0200
Message-ID: <5539BA6E.4090701@bitmessage.ch>
Date: Fri, 24 Apr 2015 03:37:18 +0000
From: Tempest <tempest@bitmessage.ch>
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <5531370D.3010603@riseup.net>
 <20150419232637.GK8172@moria.seul.org> <5538B25D.4020309@gmail.com>
 <CAMTdTS9t4QapbgFp1+3KL3pijx5wz4iYSzuyVB2_XhpJ=vZHJA@mail.gmail.com>
 <20150423192314.GA12248@inner.h.apk.li> <553986E0.8090709@riseup.net>
In-Reply-To: <553986E0.8090709@riseup.net>
Subject: Re: [tor-talk] Clarification of Tor's involvement with DARPA's Memex
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Mirimir:
> Nothing implemented at useful scale provides better anonymity than Tor.
> I2P and JonDonym are interesting, but (other issues aside) are too
> small. I believe that combining Tor with other systems, using nested
> chains and remote workspaces, is the best approach available.

agreed. also, in how many different ways does it need to be repeated
that, if you believe the nsa is your threat model, relying on tor alone,
rather than a proper isolating disciplined opsec plan that doesn't
merely put faith on technology, is a recipe for potential disaster? this
nonsense has become beyond tedious. the fact that it is now personality
driven speaks multitudes.

-- 
gpg key - 0x2A49578A7291BB34
fingerprint - 63C4 E106 AC6A 5F2F DDB2 3840 2A49 578A 7291 BB34

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

