Delivery-Date: Sun, 29 Jun 2014 14:42:28 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,LOTS_OF_MONEY,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id CD74A1E0BA8
	for <archiver@seul.org>; Sun, 29 Jun 2014 14:42:26 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 877F32D4CE;
	Sun, 29 Jun 2014 18:42:23 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 5761E2EC4A
 for <tor-talk@lists.torproject.org>; Sun, 29 Jun 2014 18:30:39 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id m0nrABO4T7Us for <tor-talk@lists.torproject.org>;
 Sun, 29 Jun 2014 18:30:39 +0000 (UTC)
Received: from DUB004-OMC3S27.hotmail.com (dub004-omc3s27.hotmail.com
 [157.55.2.36])
 (using TLSv1.2 with cipher AES128-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id CCE902D4CE
 for <tor-talk@lists.torproject.org>; Sun, 29 Jun 2014 18:30:38 +0000 (UTC)
Received: from DUB121-W8 ([157.55.2.8]) by DUB004-OMC3S27.hotmail.com with
 Microsoft SMTPSVC(7.5.7601.22701); Sun, 29 Jun 2014 11:30:35 -0700
X-TMN: [NxX7hhMAyWDybTprJj/wVCbAn1ISZzj1]
X-Originating-Email: [mark.mccarron@live.co.uk]
Message-ID: <DUB121-W86939E080941414B17058C8050@phx.gbl>
From: Mark McCarron <mark.mccarron@live.co.uk>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
Date: Sun, 29 Jun 2014 19:30:35 +0100
Importance: Normal
In-Reply-To: <20140629184155.5ff9247c@gate.rlogin.net>
References: <CAJVRA1Tydi5nB544ggjZM2BvPXC=zGr_8AReO0qP_pxQ3me4UA@mail.gmail.com>,
 <CAD2Ti2_F_Zbt8uL5s=hNXaNapnof2KSOPZFVgN3B-qxp5JtQqA@mail.gmail.com>,
 <CAJVRA1QzUniu3cLgqLitZR7tp4TchrqD+Ak_Os0Hrm2Oe9aScw@mail.gmail.com>,
 <DUB121-W20A3812716DFD202050E82C81B0@phx.gbl>,
 <20140627153801.0000732c@unknown>,
 <CAJVRA1SWot6NxuTQp+KTYRz-f2HWy0S+N=CHRQ2aWgeX1j_5Lg@mail.gmail.com>,
 <20140628111900.00000808@unknown>,
 <DUB121-W272A32F9E91A912C390F4FC81A0@phx.gbl>,
 <CAOsGNSRgZfy7Z5UgNeDR5pR1E4n2zkB2U9=2w8uQhUfw+C_Raw@mail.gmail.com>,
 <DUB121-W1569A0B26038589393C77C8050@phx.gbl>,
 <20140629123120.GG7408@moria.seul.org>,
 <DUB121-W30D5648E04D29891281A60C8050@phx.gbl>,
 <20140629184155.5ff9247c@gate.rlogin.net>
MIME-Version: 1.0
X-OriginalArrivalTime: 29 Jun 2014 18:30:35.0453 (UTC)
 FILETIME=[37B736D0:01CF93C8]
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] Illegal Activity As A Metric of Tor Security and
 Anonymity
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Mick,

Congratulations, so you found someone with a similar name what are the odds of that.  When you are reduced to digging up dirt, it stems from the fact that you are trying to change the nature of the discussion.

FYI, I am a security specialist.  I've previously worked with the Australian Federal Government designing software and infrastructure security for multi-million dollar projects to support National Security.  In fact, I do most of my consultancy work for government.

I see Roger has remained quiet, so I am assuming he either does not want to address the issue or is subject to a National Security letter.

These questions remain:

1.  Why does Tor appear to fit so well with a large scale espionage program that was implemented around the same time (namely PRISM)?
2.  Why, given the publication of details about PRISM, were moves not made to secure the Tor network?
3.  Why is there so much hostility to these questions, including character attacks and ad hominems?
4.  Is Tor an elaborate scam by the US military? (perhaps along with Bitcoin???)
5.  Why, given the simplicity of the solution, was hosting not an internal service in Tor right from the start?

As I have eluded to before, it does seem to me that Tor was designed to integrate into the US espionage apparatus and present itself as solution to anonymity, when in fact, it was ensuring complete traceability to the US government and selected partners.  Let me be clear on this, I do not think this was an unfortunate accident.

Regards,

Mark McCarron

Date: Sun, 29 Jun 2014 18:41:55 +0100
From: mbm@rlogin.net
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

On Sun, 29 Jun 2014 14:11:18 +0100
Mark McCarron <mark.mccarron@live.co.uk> allegedly wrote:
 
> Roger,
> 
> I see that you were quite quiet whilst ad hominem attacks were being
> made against me.  But I will put that to one side for the moment.
> 
> As you mentioned, there are legitimate worries, mainly that Tor and
> people like yourself have a conflict of interest.  The main funding
> appears to come from the US military.  It appears to many of us, that
> the software has been deliberately kept weak to traffic analysis to
> support US intelligence operations.  In fact, it seems to 'fit like a
> glove'.  Further, that the issue of traffic analysis has been
> discussed in convoluted terms as a means of keeping that way.  Hiding
> from traffic analysis is not rocket science, nor does it require
> endless reams of papers and speeches on packet obfuscation.
> 
> Given that you are the head guy, I want to know what is going on?  If
> your reply consists of the stock answer, "well this is complex", keep
> in mind that I am a security specialist too and know that to be
> untrue.
> 
> I don't mean to be confrontational in any way, but the credibility of
> this project is on the line here.
> 
 
/breaking my own rule
 
"It appears to many of us" - who is this "us"? You don't speak for me,
nor apparently for many others on this list. 
 
And are you any relation to the Mark McCarron referenced at [1] and [2]?
 
[1]
http://www.indymedia.org.uk/en/2007/03/366503.html
 
[2]
http://www.theregister.co.uk/2003/07/09/weve_found_the_perfect_solution/
 
Best
 
Mick
 
(oh, and BTW, there is a difference between "effect" and "affect" -ref:
your email of 27 June @10:53:46)
 
---------------------------------------------------------------------
 
 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
 http://baldric.net
 
---------------------------------------------------------------------
 

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk 		 	   		  
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

