Delivery-Date: Sat, 28 Jun 2014 10:26:40 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 751F41E04FE
	for <archiver@seul.org>; Sat, 28 Jun 2014 10:26:38 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 7C00D2F778;
	Sat, 28 Jun 2014 14:26:37 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 555472F6F5
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 14:16:23 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id FCugvduRlB04 for <tor-talk@lists.torproject.org>;
 Sat, 28 Jun 2014 14:16:23 +0000 (UTC)
Received: from mail-yk0-x234.google.com (mail-yk0-x234.google.com
 [IPv6:2607:f8b0:4002:c07::234])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 3639E2F6F2
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 14:16:23 +0000 (UTC)
Received: by mail-yk0-f180.google.com with SMTP id 131so3598717ykp.39
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 07:16:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=date:from:to:subject:message-id:in-reply-to:references:mime-version
 :content-type:content-transfer-encoding;
 bh=a6GzSR/pztApjKjLQU/pljFx5zOKZx60x+uWffYfdNY=;
 b=f9h/fqrMsRIEGjnRVXFLAA895wTJnLDtcXMYowt8tU5MIrSFLO7F8ueTXolVBeaVPz
 ZljukH23P9VppUwA70vSRdoI45gPa3o4csJUxJxyqNUcLfJi+lzDXG259zjJ49U0zSTJ
 F7sBn41C9qJOBUdaJqnJz2p1YFWYqydCuYJSOF5NRtDDdalrZQ+eBbGPnRIVYMrMx8l+
 vXnqA/4fiEYclr4SeQnaVDs3zbI5IdCwGkZvj7yBdM4AVthcCHf6JP5yZ4rrXNHzD/US
 9qyxQDr4vPzwbX/Zp1KvjXjfJYe3tS1c0pFhbU563apDwbLivgkt8jarV09u3VDNIqiv
 VD7w==
X-Received: by 10.236.46.5 with SMTP id q5mr41566884yhb.21.1403964980587;
 Sat, 28 Jun 2014 07:16:20 -0700 (PDT)
Received: from unknown ([64.76.4.18])
 by mx.google.com with ESMTPSA id k5sm9574718yhh.6.2014.06.28.07.16.17
 for <tor-talk@lists.torproject.org>
 (version=SSLv3 cipher=RC4-SHA bits=128/128);
 Sat, 28 Jun 2014 07:16:20 -0700 (PDT)
Date: Sat, 28 Jun 2014 11:19:00 -0300
From: Juan <juan.g71@gmail.com>
To: tor-talk@lists.torproject.org
Message-ID: <20140628111900.00000808@unknown>
In-Reply-To: <CAJVRA1SWot6NxuTQp+KTYRz-f2HWy0S+N=CHRQ2aWgeX1j_5Lg@mail.gmail.com>
References: <DUB121-W32E5B8525EB5756FB0DD73C8190@phx.gbl>
 <53AB3C75.4020105@gmx.com>
 <DUB121-W401DDF2EB0B4F36357ADA2C8190@phx.gbl>
 <53AB742E.5000400@riseup.net>
 <DUB121-W1602424B2673FF14097129C8180@phx.gbl>
 <53ABAAFA.1040406@riseup.net>
 <CAJVRA1Tydi5nB544ggjZM2BvPXC=zGr_8AReO0qP_pxQ3me4UA@mail.gmail.com>
 <CAD2Ti2_F_Zbt8uL5s=hNXaNapnof2KSOPZFVgN3B-qxp5JtQqA@mail.gmail.com>
 <CAJVRA1QzUniu3cLgqLitZR7tp4TchrqD+Ak_Os0Hrm2Oe9aScw@mail.gmail.com>
 <DUB121-W20A3812716DFD202050E82C81B0@phx.gbl>
 <20140627153801.0000732c@unknown>
 <CAJVRA1SWot6NxuTQp+KTYRz-f2HWy0S+N=CHRQ2aWgeX1j_5Lg@mail.gmail.com>
X-Mailer: Claws Mail 3.9.0cvs12 (GTK+ 2.16.6; i586-pc-mingw32msvc)
Mime-Version: 1.0
Subject: Re: [tor-talk] Illegal Activity As A Metric of Tor Security and
 Anonymity
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Fri, 27 Jun 2014 13:48:27 -0700
coderman <coderman@gmail.com> wrote:

> On Fri, Jun 27, 2014 at 11:38 AM, Juan <juan.g71@gmail.com> wrote:
> >...
> >         And so we have amusing tor lackeys like =A8coderman=A8
> >         parroting propaganda that not even the tor developers
> >         themselves believe.
> =

> this is amusing! explain to me where i've said Tor resists traffic
> analysis? :)

	As I already mentioned,  you and others talk as if that were the
	case. As a matter of fact you are doing it again in this =

	(previous) message of yours.

> =

> my point is that Tor is harder than the software you're using over it.

	That is just a generality, a half truth, and not relevant in
	this context.  It is an excuse and a distraction.


> web browsers, instant messaging clients, web services and poorly
> implemented applications.
> =

> why do you need traffic analysis when trivial attacks work just as
> well?

	I dont need traffic analysis, I am not a government nazi. =


	However,  government nazis do need traffic analysis to
	deal with people who correctly configure their servers.

	It shouldnt be necessary for me to point out such obvious
	fact? =


	Also, if attacks against  servers are =B4easy=B4,
	why did it take years for the government  to get freedom
	hosting? =


> =

> =

> =

> >         So, how did the american gestapo get freedom hosting and
> > silk road? Traffic analysis.
> =

> citation needed.  all signs point to insider threat (you know, rats)


	Citation needed? What kind of citation? I make my case based on
	basic, correct reasoning and public information. And you have
	nothing to counter it. =


	And what are *you* doing? Are you indeed parroting the
	official story? Are you that =B4naive=B4? =


	> all signs point to insider threat (you know, rats)

	So, wheres **your** evidence for that parallel story? =



> =

> =

> =

> >         https://en.wikipedia.org/wiki/Parallel_construction
> =

> we could have a long discussion on this subject, but not apropos to
> this list...

	What? You dont want to discuss how fuckingly corrupt the US
	government is in a list that belongs to the US government? =


	You dont want to discuss the fact that the american =B4justice=B4
	system is based on blatant lies and that they even have a
	procedure in place to manage those blatant lies?

	tsk tsk tsk =

	=

	And, au contraire, the discussion is 100% a propos this mailing
	list. =


	See, you are basing your baseless defence of Tor (US
	military project)  on lies from the US government, lies which in
	turn can be traced to so called =A8parallel contstruction=A8.

	=

> =

> =

> best regards,
> =

> =

> =

> TL;DR:  Tor is not the weak spot in your privacy. =



	Baseless assertion.


> OPSEC, application
> attack surface, pervasive information insecurity - these are all going
> to betray you before some fundamental vulnerability in Tor protocol.


	False, baseless assertion. Notice again  how you fail to
	specify the =B4threat model=B4, to use your military jargon.

	You are not explicitly saying that tor resists traffic
	analysis, but you are saying something that amounts to the same
	thing - that traffic analysis doesnt matter.




J.

-- =

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

