Delivery-Date: Wed, 29 Jul 2015 09:51:07 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 8CEB31E0349;
	Wed, 29 Jul 2015 09:51:05 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id B55CF35712;
	Wed, 29 Jul 2015 13:51:00 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 13F64356C3
 for <tor-talk@lists.torproject.org>; Wed, 29 Jul 2015 13:50:57 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id EV7AM_7b70zY for <tor-talk@lists.torproject.org>;
 Wed, 29 Jul 2015 13:50:57 +0000 (UTC)
Received: from ccs.nrl.navy.mil (mx0.ccs.nrl.navy.mil
 [IPv6:2001:480:20:118:118::211])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id E669D35660
 for <tor-talk@lists.torproject.org>; Wed, 29 Jul 2015 13:50:56 +0000 (UTC)
Received: from vpn212046.nrl.navy.mil (vpn212046.nrl.navy.mil [132.250.212.46])
 by ccs.nrl.navy.mil (8.14.4/8.14.4) with ESMTP id t6TDopk1031924
 (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256 verify=NOT)
 for <tor-talk@lists.torproject.org>; Wed, 29 Jul 2015 09:50:52 -0400
Date: Wed, 29 Jul 2015 09:50:51 -0400
From: Paul Syverson <paul.syverson@nrl.navy.mil>
To: tor-talk@lists.torproject.org
Message-ID: <20150729135051.GB19830@vpn212046.nrl.navy.mil>
References: <CADop2NGNaenBevLji14cYyD-U=awKYX_WWq1t5F9gW+1wOhYbA@mail.gmail.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <CADop2NGNaenBevLji14cYyD-U=awKYX_WWq1t5F9gW+1wOhYbA@mail.gmail.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-CCS-MailScanner: No viruses found.
X-CCS-MailScanner-Info: See: http://www.nrl.navy.mil/ccs/support/email
Subject: Re: [tor-talk] Historically speaking,
 what was the U.S. navy /military
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hi Virgil,

On Wed, Jul 29, 2015 at 12:32:56PM +0000, Virgil Griffith wrote:
> intending to use Tor for?
> 
> I know the classic story of US intelligence agents wanting to phone home
> from Beijing hotels without Chinese intelligence knowing they were phoning
> home as a partial motivation for open-sourcing Tor.
> 
> But what was the Navy/military originally hoping to use Tor-related
> protocols for? It's unclear to me what their historical motivations were.

If I'm understanding you, it's a question with a presupposition
failure. Nobody came to us and said, "We have this problem we're
encountering in the field.  How would you solve it?" We (David,
Michael, and I) thought of an interesting research problem and
solution area that could also ultimately result in technology that
would be useful to the Navy. We then applied for funding to research it.

We came up ourselves with potential application suggestions such as
open source intelligence gathering or "phoning home" as you put it.
We also came up with other ideas (some good, some bad) and also talked
to people about how it might be useful.  As another example that I
remember from an early briefing slide: We knew about the 1991 pentagon
pizza channel
http://urbanlegends.about.com/od/government/a/war_and_pizza.htm 
and we speculated that maybe in the future people would even be doing
incredible stuff like ordering food online (The Web was only two years
old at that point.)  We had a picture where the ordering
information went over the Web from the Pentagon to Domino's and was
routed by an enemy (Iraq at the time of the putative pizza channel
concern). I remember a point I would make during presentations was
that the enemy could see the number of orders made by people at the
Pentagon to Domino's even if he couldn't break the encryption to know
if they were for pepperoni or extra cheese.  (And this was years
before ShmooCon 2005 when Nick Mathewson uttered the immortal line:
"Look. Dan Kaminsky has just fit an entire meat-lover's pizza inside a
DNS request.")

There is some more discussion of the history
of onion routing (including Tor) here

http://www.acsac.org/2011/program/keynotes/syverson.pdf

also, though the slides above are not in it (I'll have to look around)
for some other application ideas see
http://www.onion-router.net/Publications/Briefing-1996.pdf 
(Note that in those slides we said onion routers were Chaum mixes
because when we told more experienced researchers about onion routing,
they told us these were a form of Chaum mixes (with which we were
initially unfamiliar).  We didn't really articulate the important
differences till much later.)


HTH,
Paul
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

