Delivery-Date: Wed, 27 Jan 2016 18:35:15 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 7AB5E1E0B65;
	Wed, 27 Jan 2016 18:35:12 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 7418932CF7;
	Wed, 27 Jan 2016 23:35:04 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 88EC82842A
 for <tor-talk@lists.torproject.org>; Wed, 27 Jan 2016 23:35:01 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id IzLmfXR27IJV for <tor-talk@lists.torproject.org>;
 Wed, 27 Jan 2016 23:35:01 +0000 (UTC)
Received: from smtp6.openmailbox.org (smtp6.openmailbox.org [62.4.1.40])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 3E91C2197F
 for <tor-talk@lists.torproject.org>; Wed, 27 Jan 2016 23:35:01 +0000 (UTC)
Received: by mail2.openmailbox.org (Postfix, from userid 1004)
 id 581F52AC3C0C; Thu, 28 Jan 2016 00:34:57 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1453937697;
 bh=s/R4h5h8R62XRMidpnsaM2wYiB9/VbMPD9j73Tna6sI=;
 h=Date:From:To:Subject:In-Reply-To:References:From;
 b=N/OazHl2cH5eDlwYqXmjaQoH+LWcS80GEEeBohEJL6fx8iux3n8HvPyzSaBlNXVfn
 E3bCvaWYGYNyLrBTRDA3KrXYFZq2lnNz1qvyTwtc/zDEtpDlc06SeKPF5kJ7U86Qwd
 PiVDddc6WFaeqD4wsz+ueFEHWKEiBi4TJAPEiSf0=
Received: from www.openmailbox.org (openmailbox-b1 [10.91.69.218])
 by mail2.openmailbox.org (Postfix) with ESMTP id 3ADA72AC3B9B
 for <tor-talk@lists.torproject.org>; Thu, 28 Jan 2016 00:34:57 +0100 (CET)
MIME-Version: 1.0
Date: Wed, 27 Jan 2016 15:34:57 -0800
From: Spencer <spencerone@openmailbox.org>
To: tor-talk@lists.torproject.org
In-Reply-To: <20160125152520.GW71377@vpn212046.nrl.navy.mil>
References: <n82b3t$g4v$1@ger.gmane.org> <56A53291.8060708@gmail.com>
 <56A53342.1010502@riseup.net>
 <B215E953-7E06-4502-9BD8-1D19B8987B79@riseup.net>
 <n83i6p$3c6$4@ger.gmane.org>
 <7730df330072bf3f626e71525aa5e149@openmailbox.org>
 <20160125152520.GW71377@vpn212046.nrl.navy.mil>
Message-ID: <07eec09f71527ebea827b35eff18d5ed@openmailbox.org>
X-Sender: spencerone@openmailbox.org
User-Agent: Roundcube Webmail/1.0.6
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] =?utf-8?q?Using_VPN_less_safe=3F?=
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hi,

Thank you for your thoughtful response (:

> 
> Paul Syverson:
> diversity of trust
> 

This has no definition that I could quickly find. It is an 
anthropological area of research, though, such as inquiring into how 
trust works in diverse communities, with more research needed.

> 
> this does not mean 'let the Tor Project or... select a
> route and hand it to you'.
> 

Why not.  I am forced to update [0], unless I never close this session. 
This tactic is more aggressive than Windows 10 upgrades ):

This approach degrades trust.  How am I then expected to trust that 
other things won't function the same?

> 
> experts
> 

Means try through experience.

> 
> have thought about
> 

My snips show lack of experience and trying; thought experiments can 
only go so far:

>> 
>> Tor Project FAQ Snip:
>> undefined and potentially unsafe behavior ...
>> it is not clear if this is safe ...
>> it has never been discussed ...
>> we don't understand ...
>> 
> 
> configuration settings so you can do differently...
> informed a choice as possible and understand
> what the issues are
> 

Where is the education for this located?  I would love to know more.  
The development trend seems to be to hide complexity instead of educate.

> 
> This is not ready for deployment for everybody's Tor
> clients to do their own trust-aware route selection.
> 

Why, are they not trusted?

> 
> understand how diverging from the pack will affect you.
> 

It seems that this falls into the realm of responsibility of the Tor 
Project.  What information is there sitting around waiting to be 
restructured into a consumable bite that could help people understand 
what the experience is really?

Wordlife,
Spencer

[0]: Torprosoft.png


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

