Delivery-Date: Wed, 31 Dec 2014 10:31:26 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,URIBL_BLOCKED
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 269C81E022E
	for <archiver@seul.org>; Wed, 31 Dec 2014 10:31:24 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 3B5B832B1D;
	Wed, 31 Dec 2014 15:31:21 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id E240832AE3
 for <tor-talk@lists.torproject.org>; Wed, 31 Dec 2014 15:31:17 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 0kFB2YglbFjw for <tor-talk@lists.torproject.org>;
 Wed, 31 Dec 2014 15:31:17 +0000 (UTC)
Received: from mail2.openmailbox.org (mail2.openmailbox.org [62.4.1.33])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 959A432506
 for <tor-talk@lists.torproject.org>; Wed, 31 Dec 2014 15:31:17 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by mail2.openmailbox.org (Postfix) with ESMTP id 508EC201AA6
 for <tor-talk@lists.torproject.org>; Wed, 31 Dec 2014 16:31:14 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=openmailbox.org;
 h=user-agent:message-id:subject:subject:from:from:date:date
 :content-transfer-encoding:content-type:content-type
 :mime-version:received:received; s=openmailbox; t=1420039870;
 bh=2vuQVHWd+WTZ9htbf6BmmUZbbZnhTcf5gd1IiCnosnc=; b=qd1VJAbfySey
 Q561J8jGgOU+4sbU39ER8H6il/1BZF54kdfDCNenovGbi5WRc6cK5y9vqRwyujbs
 EAJxxo1z0/rrb0Z1vgNSZOGzQMz12o9/BJkfMy86WkQcwTt5ysFJB1VwlnYsQmIo
 nBfG3YnE7TcgcSIqGXVDKERwz9N/w7I=
X-Virus-Scanned: amavisd-new at openmailbox.org
Received: from mail2.openmailbox.org ([62.4.1.33])
 by localhost (mail.openmailbox.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 06DvHMnVQEoX for <tor-talk@lists.torproject.org>;
 Wed, 31 Dec 2014 16:31:10 +0100 (CET)
Received: from www.openmailbox.org (localhost [127.0.0.1])
 by mail2.openmailbox.org (Postfix) with ESMTP id 82696200B3C
 for <tor-talk@lists.torproject.org>; Wed, 31 Dec 2014 16:31:10 +0100 (CET)
MIME-Version: 1.0
Date: Wed, 31 Dec 2014 07:31:10 -0800
From: spencerone@openmailbox.org
To: tor-talk@lists.torproject.org
Message-ID: <a46e37b60f92b9d1305a60e4841043c1@openmailbox.org>
X-Sender: spencerone@openmailbox.org
User-Agent: Roundcube Webmail/1.0.4
Subject: [tor-talk] All I Want For X-mas: TorPhone
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Arxaios, I think you may be confusing cannot with should not.   Though, 
regarding TorPhone, it is established that WiFi and cellular antenna 
connections as a means of communication are by nature able to track 
people, as that seems to be how they work.  However, I do not think that 
implies that we should give up.

Though they would still share your location, encrypted or not, we could 
put hardware switches on TorPhone, allowing people to physically disable 
their WiFi and cellular antennas as easily as adjusting the audio 
volume.  This could also apply to other things, like non-removable 
batteries, as a way of ensuring that no connections can be made.  Even 
just a network filter would assist people in limiting, or cutting off 
completely, network connections, especially those which share location 
data.

And, regarding your "first rule" of back doors and open systems as a 
safety, rules are meant to be broken :)

Nathan, thanks!  I am familiar with Orwall, though configuring 
applications to route traffic through Orbot isn't a walk in the park for 
most people, since their is a warning about using non-tor configured 
applications on the site.  Many people don't even understand what root 
access is, let alone be able to achieve it.  Tomy sounds cool.  Though, 
from what I can read, it has a ways to go.  Also, there is the 
limitation for many people of not understanding having a second 
partition/OS on their device.  If it came pre-installed and could be 
switched over to at will with a gesture or two, then that could be super 
cool and easy to manage.

Giovanni, Janus sounds great, but very esoteric and a lot to learn, at 
least for most people.

We'll see what the new year brings.

Awesome,
SpencerOne

--------------

> Arxaios haris at arxaios.net said:
> 
> I know this because I am a Greek , but you cannot mix Greek Letters
> which obviously you do not have a clue what they mean, with English
> words. Ether you write full words in Greek or in English , and do not
> mix BECAUSE THEY DO NOT MIX TOGETHER. The Greek language is the most
> encrypted language in the word with millions of combinations and
> meanings .! Not my words only , but a lot of programmers + developers 
> in
> various computer companies.
> 
> Anyway ..about tor phone now... Do YOU really believe that there is an
> anonymity in the tor network?? because if you think so , then you are
> mistaken badly. Everything and I mean EVERYTHING are monitored by the
> people behind the "scenes" as I call them. All the phone calls , emails
> and every information is monitored by the "SYSTEM" and of course they
> file you , knowing everything about you. They will never let anything
> like tor-phone unattached no matter what encryption it will use.
> 
> If you do not believe the above , then ask yourself this simple 
> question
> : The people who will design the encrypted protocols will also leave
> some "back doors" open as a safety. The first rule is not to build
> something "closed" because if something goes wrong you will not have
> access to it to fix it. Simple as that. So the big question is : how
> safe do you think you are??"
> 
> Arxaios.

--------------

> Nathan Freitas nathan at freitas.net said:
> 
> Orwall is an attempt to automate the firewall configuration Mike 
> covered
> in his blog, and to improve open (and replace) Orbot's transparent
> proxying features: https://github.com/EthACKdotOrg/orWall
> 
> There is also someone else (I can't find the link right now), working 
> on
> automating all of the core system changes in the post through a
> flashable updater on top of AOSP or Cyanogen. This is an effort that I
> will be focusing on supporting more in 2015.
> 
> Built on that is our longer term concept of a TAILS-like mobile system
> called Tomy, that can utilize bootable USB drives with Android phones
> and tablets:
> https://dev.guardianproject.info/projects/libro/wiki/Tomy_Detachable_Secure_Mobile_System

--------------

> Giovanni Pellerano giovanni.pellerano at evilaliv3.org said:
> 
> yep, eventually it could be implemented a trick that vecna used in
> SniffJoke and i reimplemented some years ago in Janus:
> https://github.com/evilaliv3/janus
> 
> this way nathan things can be done really more in a transparent way.
> 
> fqrouter used it on android phones with success in past reimplementing
> janus concepy in python: https://gist.github.com/fqrouter/5083321

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

