Delivery-Date: Fri, 25 Jul 2014 00:57:26 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 2BE021E0E1A
	for <archiver@seul.org>; Fri, 25 Jul 2014 00:57:24 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 116DB2F9FA;
	Fri, 25 Jul 2014 04:57:23 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id CB0CB2F904
 for <tor-talk@lists.torproject.org>; Fri, 25 Jul 2014 04:48:11 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id yLw9l_Qixakj for <tor-talk@lists.torproject.org>;
 Fri, 25 Jul 2014 04:48:11 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net", Issuer "Gandi Standard SSL CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id A20BB2E4B7
 for <tor-talk@lists.torproject.org>; Fri, 25 Jul 2014 04:48:11 +0000 (UTC)
Received: from fulvetta.riseup.net (fulvetta-pn.riseup.net [10.0.1.75])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net", Issuer "Gandi Standard SSL CA" (not verified))
 by mx1.riseup.net (Postfix) with ESMTPS id 815E753940
 for <tor-talk@lists.torproject.org>; Thu, 24 Jul 2014 21:48:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=riseup.net; s=squak;
 t=1406263688; bh=6FKit8iOEZLe6Y/CcozCiQz8IrL+7skfCjhlNWSq5Fo=;
 h=Date:From:To:Subject:References:In-Reply-To:From;
 b=Q/X/q4mUIU42izub4XIDJh9WS+FiODLvgEvN0I2URV3Rn6OzYv8uTGT0526PzvPZV
 ddfCjhILgHhW4B/XtJm+mJch4Z652MeOGUrBz1a0yo6xTyRQ+aHsIgnzw3NSlFF6HJ
 nS3eu45Mxm3RDd5uA/ck4OjwnmHrpOgg2DhJRxA8=
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (Authenticated sender: mirimir@fulvetta.riseup.net)
 with ESMTPSA id 9FCC51DA
Message-ID: <53D1E183.4050506@riseup.net>
Date: Thu, 24 Jul 2014 22:48:03 -0600
From: Mirimir <mirimir@riseup.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
 rv:31.0) Gecko/20100101 Thunderbird/31.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <53D16B7A.6000100@cpunk.us> <20140724203626.GS7408@moria.seul.org>
 <53D177B8.4010306@riseup.net> <53D17AD6.4050803@sec.gd>
 <53D180B2.4060800@riseup.net> <53D181B5.1030205@sec.gd>
 <CAP-DOiR44bEgA=h7g=p_o59fUfpjdqwx3VUac2cb=GkqvMBugg@mail.gmail.com>
 <20140725023839.GB13566@localhost> <53D1CEDC.5020808@gmx.com>
In-Reply-To: <53D1CEDC.5020808@gmx.com>
X-Enigmail-Version: 1.6
X-Virus-Scanned: clamav-milter 0.98.1 at mx1
X-Virus-Status: Clean
Subject: Re: [tor-talk] Why does requesting for bridges by email require a
 Yahoo or Gmail address?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 07/24/2014 09:28 PM, Joe Btfsplk wrote:
> 
> On 7/24/2014 9:38 PM, Matthew Finkel wrote:
>> On Thu, Jul 24, 2014 at 10:29:49PM +0000, ideas buenas wrote:
>>> I don't trust Gmail nor Yahoo. Roger, found another way. No excuses,
>>> please.
>>>
>> This actually has very little to do with trust, and (as Roger said)
>> these providers were chosen because of the difficulty of creating new
>> accounts. Out of curiousity, what are you actually worried about?
>> Personally, it is sad that you need a phone number when you create
>> these accounts over Tor, but if retrieving bridges is important (and
>> it usually is), then there are usually ways to do this safely.
>>
>> Another distribution method is currently being written and we will
>> write others in the future, but please help us provide another way
>> (yes, you, please help us if the current situation is unsatisfactory!).
>> The more people we can safely help, the better.
> 
> I don't understand.  I haven't tried to create an email acct w/ Google
> in yrs, but as I understand it, unless you have a burner phone, a new
> acct won't be anonymous.
> 
> 1) Is it important to have anonymous email to request bridges? 
> Seriously.  I've never done it.

Whether or not it's crucial depends on your adversaries. If your
adversaries include the NSA or Five Eyes, it's crucial. Otherwise,
especially if your adversaries are their adversaries, it likely doesn't
matter. And if your adversaries do include the NSA etc, you need a safer
way to get your bridges ;)

If you need bridges, one of your adversaries is your ISP, or whatever
controls it. As long as you're using HTTPS, that adversary will not even
see that you got bridges. The NSA etc may know via XKeyScore, or
whatever the latest iteration is called. But that only matters if they
are working with your ISP-related adversary.

> 2) If (1) = yes, --> GOTO (4)
> 3) No sweat
> 4) Google is the wrong provider for you. :D

Even if you do need an "anonymous email address", that doesn't rule out
Gmail or Yahoo. You can create an account via public WiFi, and use
http://receive-sms-online.com/ to get the authentication code. To
protect against MAC tracking, you can use a USB WiFi adapter. That way,
there's no link to the IP address that you'll be using with Tor.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

