Delivery-Date: Sun, 15 Jun 2014 18:11:43 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,FREEMAIL_FROM,
	FROM_LOCAL_NOVOWEL,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by moria.seul.org (Postfix) with ESMTPS id 3D16C1E0A39
	for <archiver@seul.org>; Sun, 15 Jun 2014 18:11:42 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 710482FE91;
	Sun, 15 Jun 2014 22:11:35 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id E2EE82FE6A
 for <tor-talk@lists.torproject.org>; Sun, 15 Jun 2014 22:06:34 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id paVRr2jqFUQs for <tor-talk@lists.torproject.org>;
 Sun, 15 Jun 2014 22:06:34 +0000 (UTC)
Received: from mout.gmx.com (mout.gmx.com [74.208.4.200])
 (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id C8B2B2FE5F
 for <tor-talk@lists.torproject.org>; Sun, 15 Jun 2014 22:06:34 +0000 (UTC)
Received: from [127.0.0.1] ([99.190.181.188]) by mail.gmx.com (mrgmxus002)
 with ESMTPSA (Nemesis) id 0MdKxJ-1XDh5w3bRz-00IVpe for
 <tor-talk@lists.torproject.org>; Mon, 16 Jun 2014 00:06:32 +0200
Message-ID: <539E18DF.2060206@gmx.com>
Date: Sun, 15 Jun 2014 17:06:23 -0500
From: Joe Btfsplk <joebtfsplk@gmx.com>
User-Agent: Mozilla/5.0 (Windows NT 6.0; WOW64;
 rv:24.0) Gecko/20100101 Thunderbird/24.5.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <539BCD4A.1020805@torproject.is> <539BF7EF.3050806@googlemail.com>
 <539D15C7.4030702@torproject.is> <539DC3B5.3070903@gmx.com>
 <CAD2Ti282+TmKEOVX_8=gG7VaF3FDHuytn4OhwJAiag3QzRbwug@mail.gmail.com>
In-Reply-To: <CAD2Ti282+TmKEOVX_8=gG7VaF3FDHuytn4OhwJAiag3QzRbwug@mail.gmail.com>
X-Provags-ID: V03:K0:d8IcCUeXg/ALRpa/KWO7tzJV7qbAFF0ZkU+phrKRBfssv0LTebU
 ryxKnZPTeQg/1YElmSRKMku6RjvjtrBqSq7Ua/xxAkm0IYqEuNRy3vTyjJdm5N59lxQ/JPQ
 spGAXBZkojj3wl5UE2HDpWQg2NckvtXlpy8ppPtTD3Jvy/Y+jExXL0Zv8qU6n846UqnOc4O
 zcu7DArnSfVN/w49UnFOg==
Subject: Re: [tor-talk] Non-free country law preventing Tor from getting
	donations
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


On 6/15/2014 2:52 PM, grarpamp wrote:
> The code is open for inspection so it's not an overt issue, and the
> cash funds a lot of good research.
I'm not accusing Tor Project of anything underhanded.  And you are 
correct (it funds a lot of research).
I'm saying, to the public & many potential users, perception is reality, 
and you're judged by the company you keep.

In general, those human behaviors / concepts are inescapable.

In regards to the code being open for inspection, apparently that 
doesn't mean a whole lot.

Though most of the "hidden" backdoors, etc., associated w/ gov't action 
have been proprietary, there have been a few cases where "strange" 
things in open source code were hidden well enough, that no one 
discovered them for a long time.  If I'm wrong, I stand corrected.

Seriously, how many people that don't work on Tor / TBB code every day, 
could just "look" at the code & understand every single thing it does, 
down to the tiniest detail?
Or how many people actually have the time to examine every single line 
of code, that also have the expertise to understand everything, to the 
smallest detail?  Not many.

If that's not significant, the NSA has spent billions (w/ a 'B') - to 
encourage companies & countries to do what they want.
They also developed skills & a network, that most people thought 
unimaginable.  Like science fiction.  That's now a fact.  When I 
mentioned that potential capability a few yrs ago, that idea was shot 
down by Mr. Perry.  In his defense, he was in good company - most people 
couldn't imagine they could ever do the things that actually became true.

That said, if NSA & who knows who else, will pay tens or hundreds of 
millions to companies & countries to get what they want, they 
*certainly* would spend whatever it took to set up enough of their own 
relays to capture a significant % of Tor traffic. Still think that's 
impossible?  Read ALL of the released Snowden document.   I heard 
Snowden say in recent interview, there are more documents coming - 
probably this Summer - that are just as mind blowing, or more, than any 
so far.

OK - but what about Tor's encryption?  Well, it may be uncrackable 
today, but what about in a month?  The NSA & many other gov'ts have 
literally the best computer minds in the world, working around the clock 
on breaking encryption. No, a lot of others (much more informed than me) 
don't think the gov't is going to sit around & do nothing, while 
terrorists or other heinous criminals use encrypted communication.

And some (naive) people may not know this, but gov'ts *don't announce* 
when they develop technology that revolutionizes spying or catching 
terrorists, etc.  It would be shooting themselves in the foot.  The 
Snowden papers were almost a once in several lifetimes event.  And if we 
think the NSA (or any gov't agency in the world) will stop illegal 
activities, just because some papers were released, we probably also 
believe in Santa Clause.  Heads of the NSA were caught straight up, 
telling bald-faced lies under oath to Congress, but all are still 
employed.  Happy as pigs in the mud.  If I had done that, I'd be *under* 
the jail right now.

Yes, I believe the NSA & other agencies have a job to do.  The question, 
how far do they actually have to go?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

