Delivery-Date: Thu, 14 Jan 2016 12:33:14 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id A64931E047C;
	Thu, 14 Jan 2016 12:33:12 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id AC13421422;
	Thu, 14 Jan 2016 17:33:08 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id D194520BF8
 for <tor-talk@lists.torproject.org>; Thu, 14 Jan 2016 17:33:04 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id K8GjZAARqUrm for <tor-talk@lists.torproject.org>;
 Thu, 14 Jan 2016 17:33:04 +0000 (UTC)
Received: from ccs.nrl.navy.mil (mx0.ccs.nrl.navy.mil
 [IPv6:2001:480:20:118:118::211])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 02ABA20407
 for <tor-talk@lists.torproject.org>; Thu, 14 Jan 2016 17:33:03 +0000 (UTC)
Received: from vpn212046.nrl.navy.mil (fw5540.nrl.navy.mil [132.250.196.100])
 by ccs.nrl.navy.mil (8.14.4/8.14.4) with ESMTP id u0EHWx3O028077
 (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256 verify=NOT)
 for <tor-talk@lists.torproject.org>; Thu, 14 Jan 2016 12:33:00 -0500
Date: Thu, 14 Jan 2016 12:32:58 -0500
From: Paul Syverson <paul.syverson@nrl.navy.mil>
To: tor-talk@lists.torproject.org
Message-ID: <20160114173258.GE44415@vpn212046.nrl.navy.mil>
References: <5697D3CA.9000803@jump-ing.de>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <5697D3CA.9000803@jump-ing.de>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-CCS-MailScanner: No viruses found.
X-CCS-MailScanner-Info: See: http://www.nrl.navy.mil/ccs/support/email
Subject: Re: [tor-talk] Escape NSA just to enter commercial surveillance?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Thu, Jan 14, 2016 at 05:58:50PM +0100, Markus Hitter wrote:
> 
> On 32C3 a few weeks ago ...
> 
> https://media.ccc.de/v/32c3-7322-tor_onion_services_more_useful_than_you_think
> 
> ... Roger cheered a lot about Facebook offering a hidden service.
> 
> To be honest, this surprises me quite a bit. Tor is for anonymisation,
> so one can escape tax paid surveillance by NSA, GCHQ & Co., which is
> useful. And then such a Tor user connects to Facebook, where one has to
> log in, making this anonymisation completely pointless? At least I don't
> get the point.


Tor is about separating identification from routing, as we explicitly
stated in publication way back in 1996. And it is not just for access
to a site from which one wants to remain anonymous or pseudonymous.
One of the motivating examples we gave when starting this work
c. 1995-6 was someone traveling wanting to log into a workstation at
their usual work location not wanting network observers to know their
association with where they work. Another example would be to login
but not identify to their destination where they are logging in
from. In both of these cases, you want to be not just identified but
authenticated by the destination.  This was part of the motivation for
Tor from the beginning of onion routing.

But whatever our motivation was, it is a tool. We should not be
dictating based on our original motivations creative ways that other
people find to make use of that tool as long as that use isn't abusive
or destructive.

As Robert Hunter brilliantly observed wrt commentary on lyrics he
wrote: I know where it's come from, but I don't know where it's been.

aloha,
Paul
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

