Delivery-Date: Fri, 12 Dec 2014 14:20:24 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD,URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 0D62B1E0B6E;
	Fri, 12 Dec 2014 14:20:23 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 4179B32192;
	Fri, 12 Dec 2014 19:20:19 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id A6CB332186
 for <tor-talk@lists.torproject.org>; Fri, 12 Dec 2014 19:20:15 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 5U7hB_JX7Iil for <tor-talk@lists.torproject.org>;
 Fri, 12 Dec 2014 19:20:15 +0000 (UTC)
Received: from khazad-dum.seul.org (khazad-dum.csail.mit.edu [128.31.0.47])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "moria.seul.org", Issuer "moria.seul.org" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 8B4123214B
 for <tor-talk@lists.torproject.org>; Fri, 12 Dec 2014 19:20:15 +0000 (UTC)
Received: by khazad-dum.seul.org (Postfix, from userid 501)
 id 7DE8C1E0D8B; Fri, 12 Dec 2014 14:20:12 -0500 (EST)
Date: Fri, 12 Dec 2014 14:20:12 -0500
From: Roger Dingledine <arma@mit.edu>
To: tor-talk@lists.torproject.org
Message-ID: <20141212192012.GI34412@moria.seul.org>
References: <20141211220732.GG34412@moria.seul.org>
 <CAAS2fgTNWCJcdOq6nd_XJC2e=iPCRxk-a4kiOgxQFnQ+2K8Ahg@mail.gmail.com>
 <20141211223234.GH34412@moria.seul.org>
 <548b322b.0480e00a.1143.ffffb753@mx.google.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <548b322b.0480e00a.1143.ffffb753@mx.google.com>
User-Agent: Mutt/1.5.20 (2009-12-10)
Subject: Re: [tor-talk] Tor and solidarity against online harassment
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Fri, Dec 12, 2014 at 03:23:42PM -0300, Juan wrote:
> > You might like
> > https://www.torproject.org/docs/faq#Backdoor
> > 
> > We won't put backdoors in Tor. Ever.
> 
> 	LOL! 
> 
> 	You work for the pentagon and are subjects of the US state.
> 
> 	The US government has secret 'courts'  and secretly forces its
> 	subjects to tamper with all kinds of 'security'  systems, in the
> 	name of 'national security'.
> 
> 	Whatever public declamations you make carry very little weight.

Hello Mr. Tor hater,

We get funding from a variety of groups, including US government groups.
We do not "work for the pentagon" but that is a separate discussion and
it shouldn't derail this one.

We are indeed subjects of various governments, and some of those
governments have indeed been doing quite bad things lately. The notion
of a secret law makes me sick.

But when it comes to governments secretly forcing us to do things, no,
there *is* a choice. And that's why we're telling you we have made this
choice: No backdoors. Ever.

To quote the faq entry, which Nick and I wrote in 2004 and it remains
true today:
"We think that putting a backdoor in Tor would be tremendously
irresponsible to our users, and a bad precedent for security software
in general."

They can't make us put backdoors in. But they can make things miserable
for us if we don't go along with it -- see the Lavabit case for an example
(and hopefully one where people learned a lesson about centralization
too). That's a major part of why I try to keep talking to the folks who
might try to force us into something -- to explain that it won't work,
and that it will backfire because then *their* colleagues, who need
privacy too, will have fewer options, to remind them that there are
other jurisdictions in the world, and so on.

Thankfully, and I'd like to think in part because of this directed
advocacy, it has never come to this decision point for us. That is, to be
clear, nobody has yet tried to force us, with secret laws or otherwise,
into undermining Tor.

Now, you're right, these are just words. That's why we try to do all of
our development in public, and the source code is open, and the research
communities are active and public, and we engage with many communities
in person at a wide variety of conferences. Please do continue to audit
and observe and help find potential problems in Tor and the ecosystem
of software around it.

We've been working on Tor for more than a decade, and in that time the
world has been becoming a worse place in many ways for privacy and free
speech. Haters are going to hate, I accept this, but for the rest of you:
thanks for continuing to help us and to support privacy!

No backdoors. Ever.

--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

