Delivery-Date: Thu, 27 Aug 2015 06:54:29 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id CC1071E0694;
	Thu, 27 Aug 2015 06:54:27 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 31B1436C15;
	Thu, 27 Aug 2015 10:54:19 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 85C7536B74
 for <tor-talk@lists.torproject.org>; Thu, 27 Aug 2015 10:54:15 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id ISujJxoZhXrU for <tor-talk@lists.torproject.org>;
 Thu, 27 Aug 2015 10:54:15 +0000 (UTC)
Received: from corp.netservicesgroup.com (corp.netservicesgroup.com
 [64.113.34.13])
 by eugeni.torproject.org (Postfix) with ESMTP id 6B27336B68
 for <tor-talk@lists.torproject.org>; Thu, 27 Aug 2015 10:54:15 +0000 (UTC)
X-Greylist: delayed 972 seconds by postgrey-1.34 at eugeni;
 Thu, 27 Aug 2015 10:54:15 UTC
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=t-3.net; s=default;
 t=1440672855; bh=Xh/YSPSIdNN7FgEJsNtOncHGGb3MXidYkX4DnTMKoPw=;
 h=From:To:Subject:Date;
 b=gAVgvgE887m/kjE2Sg2vDmIFjQHSCtAbuhFwllE9FS9gNK4fWmRh5OZWfJVAwSKFK
 18CTLka00A5KK9sdKVjftgY4AbLjtZ1t9ey44f8qR4Rh5voiEo2yYqBvr6N9uZ9lBa
 5gLE8DygKCIyof6eCXJqFHFTrAB/GzKpKNs0HSho=
X-Rcpt-Trace: tor-talk at lists.torproject.org
X-Default-Received-SPF: pass (skip=forwardok (res=PASS))
 x-ip-name=64.113.32.22; 
From: tor@t-3.net
To: <tor-talk@lists.torproject.org>
Date: Thu, 27 Aug 2015 06:38:01 -0400
Message-ID: <55dee889.312d.f2270700.61058486@t-3.net>
MIME-Version: 1.0
X-Originating-IP: 64.113.32.22
X-Mailer: SurgeWeb - Ajax Webmail Client
X-Authenticated-User: tor@t-3.net 
X-VirusScan: Message is clean (g_virus_cmd clamdscan scanned message)
X-SpamDetect: : 0.000000 
X-Vpipe: Scanner said ok (av_avast)
X-Info: aspam skipped due to (g_smite_skip_auth)
X-VirusScan: Message is clean (g_virus_cmd clamdscan scanned message)
X-MyRbl: Color=Unknown ip=64.113.32.22
X-IP-stats: Incoming Last 2, First 1, in=1, out=0, spam=0 ip=64.113.32.22
Subject: Re: [tor-talk] IBM says Block Tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


Or maybe they do realize.

We already know that the NSA/GCHQ do not appreciate Tor (per their own 
"Tor Stinks" report included within the Edward Snowden released 
content). A process which over time encourages the internet at large 
to reject Tor connections (plus makes ISPs generally unwilling to host 
exit nodes) seems that it would be in-line with the direction they 
would like to see Tor take. End result being - if a user cannot get to 
a particular site via Tor, perhaps the user drops down to regular 
internet for the visit, giving them what they want the easy way.


 On Thu, 2015-08-27 at 08:08 +0200, CJ wrote:

 > People using Tor for "bad things" just don't realize how they fuck 
up
 > the whole thing. Not even mentioning "weird contents", just the 
script
 > kiddies running metasploit/other through Tor.



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

