Delivery-Date: Thu, 18 Jun 2015 00:03:01 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 096AF1E12E9;
	Thu, 18 Jun 2015 00:03:00 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 726C436205;
	Thu, 18 Jun 2015 04:02:52 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 17A2E35FD4
 for <tor-talk@lists.torproject.org>; Thu, 18 Jun 2015 04:02:48 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id k5Dje6Hh2im3 for <tor-talk@lists.torproject.org>;
 Thu, 18 Jun 2015 04:02:48 +0000 (UTC)
Received: from mail-ig0-x235.google.com (mail-ig0-x235.google.com
 [IPv6:2607:f8b0:4001:c05::235])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id EB88E35F73
 for <tor-talk@lists.torproject.org>; Thu, 18 Jun 2015 04:02:47 +0000 (UTC)
Received: by igbqq3 with SMTP id qq3so5949764igb.0
 for <tor-talk@lists.torproject.org>; Wed, 17 Jun 2015 21:02:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:date:message-id:subject:from:to:content-type;
 bh=5MjbGClQkagZormYMu9Y+jSXvY4pVO5wrk+HncTLwdQ=;
 b=yAF/6g7rGbjWZKw75UEZaFmSDGLOy8W9OUNal5Z/CA2cEkSxaQ396rUhaE4O10HYo3
 olqkGRAbSUojq9A9WVMqXiSBDeFe1McKEUO9g0hZJRTvY/lln0zo31zROY4aXl79STvP
 AL2a2q2oCuXMAiynE0Tyj8Fgq3A+8l8xuN5OhpC98Awxqx3Y2+FiHyQZRJXSbKZCj6n1
 INco+az1hdwTAhxwxU0pL5L/OeZjtQYeUvlOWRz0GQc2E4NWHK1PhELgm96f5WEg5zRl
 8sOoIMdSLDhu31deEAvdcqCegccqh5R7U32m8XGK+Gqnb085tzDcp386RO8Bes0xzufv
 giLQ==
MIME-Version: 1.0
X-Received: by 10.107.132.226 with SMTP id o95mr12691409ioi.52.1434600165582; 
 Wed, 17 Jun 2015 21:02:45 -0700 (PDT)
Received: by 10.36.51.76 with HTTP; Wed, 17 Jun 2015 21:02:45 -0700 (PDT)
Date: Thu, 18 Jun 2015 00:02:45 -0400
Message-ID: <CAD2Ti2-xVw_W2YDqkdQHmcHyKBDQjfT5jvc-8m3EAU8UkqxrUA@mail.gmail.com>
From: grarpamp <grarpamp@gmail.com>
To: tor-talk@lists.torproject.org
Subject: [tor-talk] Matryoshka: Are TOR holes intentional?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

http://shofarnexus.com/Blog-2015-01-13

There is a common refrain that he web can never be secure.  Support
for this comes whenever someone is caught or a flaw is found in
software or an algorithm.  The controversies revolving around the TOR
Project in late 2014 seems to give support to this idea that security
is impossible.  We must separate fundamental concepts from flawed
implementations.  We also need to take a serious look at TOR, and
without emotional bias, consider if a serious flaw was designed in.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

