Delivery-Date: Thu, 14 Jan 2016 12:51:47 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD,UNPARSEABLE_RELAY autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 5AC481E0A1B;
	Thu, 14 Jan 2016 12:51:45 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id B80C72E48F;
	Thu, 14 Jan 2016 17:51:40 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 805AC21450
 for <tor-talk@lists.torproject.org>; Thu, 14 Jan 2016 17:51:37 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Ng8RO4CtD1KS for <tor-talk@lists.torproject.org>;
 Thu, 14 Jan 2016 17:51:37 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 5FDFA2042E
 for <tor-talk@lists.torproject.org>; Thu, 14 Jan 2016 17:51:37 +0000 (UTC)
Received: from piha.riseup.net (unknown [10.0.1.163])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK))
 by mx1.riseup.net (Postfix) with ESMTPS id EE55F1A1D96
 for <tor-talk@lists.torproject.org>; Thu, 14 Jan 2016 17:51:33 +0000 (UTC)
Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: phw)
 with ESMTPSA id 911971C0070
Date: Thu, 14 Jan 2016 12:51:31 -0500
From: Philipp Winter <phw@nymity.ch>
To: tor-talk@lists.torproject.org
Message-ID: <20160114175131.GA19791@nymity.ch>
Mail-Followup-To: tor-talk@lists.torproject.org
References: <5697D3CA.9000803@jump-ing.de>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <5697D3CA.9000803@jump-ing.de>
X-PGP-Fpr: B369 E7A2 18FE CEAD EB96  8C73 CF70 89E3 D7FD C0D0
X-Virus-Scanned: clamav-milter 0.98.7 at mx1.riseup.net
X-Virus-Status: Clean
Subject: Re: [tor-talk] Escape NSA just to enter commercial surveillance?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Thu, Jan 14, 2016 at 05:58:50PM +0100, Markus Hitter wrote:
> To be honest, this surprises me quite a bit. Tor is for anonymisation,
> so one can escape tax paid surveillance by NSA, GCHQ & Co., which is
> useful. And then such a Tor user connects to Facebook, where one has to
> log in, making this anonymisation completely pointless? At least I don't
> get the point.

Logging in to Facebook over Tor reveals your identity, but not your
location.  Facebook still does not know if you are logging in from
Angola or Indonesia.  Also, Facebook doesn't get to learn your operating
system or your browsing history.

Privacy tools must be policy-agnostic to experience widespread adoption.
And widespread adoption is what Tor needs to guarantee better anonymity.
As you point out, it is important to remind people of the dangers of
using Facebook.  However, it should be up to the user to decide if she
wants to use Facebook or not.

Cheers,
Philipp
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

