Delivery-Date: Thu, 14 Jan 2016 12:05:45 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id D21131E09F0;
	Thu, 14 Jan 2016 12:05:43 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 47FE521418;
	Thu, 14 Jan 2016 17:05:39 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id D173720EE2
 for <tor-talk@lists.torproject.org>; Thu, 14 Jan 2016 17:05:35 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id GgAE2viRy285 for <tor-talk@lists.torproject.org>;
 Thu, 14 Jan 2016 17:05:35 +0000 (UTC)
Received: from mail.ud03.udmedia.de (ud03.udmedia.de [194.117.254.43])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits))
 (Client CN "root.udmedia.de",
 Issuer "StartCom Class 3 Primary Intermediate Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 6700A203A9
 for <tor-talk@lists.torproject.org>; Thu, 14 Jan 2016 17:05:35 +0000 (UTC)
X-Greylist: delayed 400 seconds by postgrey-1.34 at eugeni;
 Thu, 14 Jan 2016 17:05:35 UTC
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=mail.ud03.udmedia.de; h=
 to:from:subject:message-id:date:mime-version:content-type
 :content-transfer-encoding; s=beta; bh=gUQIcN3HqCZfKjtNzg+AipSv6
 tw0wIlSBm1M8z8HltI=; b=k7nnyC5MPvkUC6LalkcxyIALwbiiDxyHZrK1XL1dn
 Lg41PAbqAEeVLfpqJjmG+hWXL9Zh/+ixmdBEli3WKDHYbJyUvaBy3FCzGN37jJ6L
 e2ToaVrsuh70td/OWsVbWNXDQJsi4ksY25Q/cGpO6mkbnz3pbm0GpUGQGmYpXAJo
 2o=
Received: (qmail 26150 invoked from network); 14 Jan 2016 17:58:51 +0100
Received: from hsi-kbw-37-209-85-196.hsi15.kabel-badenwuerttemberg.de (HELO
 ?10.0.0.102?) (ud03?291p1@37.209.85.196)
 by mail.ud03.udmedia.de with ESMTPSA (ECDHE-RSA-AES128-GCM-SHA256 encrypted,
 authenticated); 14 Jan 2016 17:58:51 +0100
To: tor-talk@lists.torproject.org
From: Markus Hitter <mah@jump-ing.de>
X-Enigmail-Draft-Status: N1110
Message-ID: <5697D3CA.9000803@jump-ing.de>
Date: Thu, 14 Jan 2016 17:58:50 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101
 Thunderbird/38.4.0
MIME-Version: 1.0
Subject: [tor-talk] Escape NSA just to enter commercial surveillance?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


On 32C3 a few weeks ago ...

https://media.ccc.de/v/32c3-7322-tor_onion_services_more_useful_than_you_think

... Roger cheered a lot about Facebook offering a hidden service.

To be honest, this surprises me quite a bit. Tor is for anonymisation,
so one can escape tax paid surveillance by NSA, GCHQ & Co., which is
useful. And then such a Tor user connects to Facebook, where one has to
log in, making this anonymisation completely pointless? At least I don't
get the point.

Even assuming that Facebook doesn't regularly exchange user data with
NSA, this makes mass surveillance trivial. Useful, welcome, or not,
Facebook does mass surveillance on its own, as stated business practice.
Also, I'm pretty sure if another Manning-like case appears, NSA would
immediately command Facebook to offer the related user identification.

If there's cheering about Facebook hidden services, shouldn't always a
note be added that logging in there identifies a user, making Tor
(almost) pointless?


Markus

-- 
- - - - - - - - - - - - - - - - - - -
Dipl. Ing. (FH) Markus Hitter
http://www.jump-ing.de/
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

