Delivery-Date: Sat, 06 Jun 2015 13:51:20 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 653651E038E;
	Sat,  6 Jun 2015 13:51:18 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 40C5135B96;
	Sat,  6 Jun 2015 17:51:12 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 32D2A3584E
 for <tor-talk@lists.torproject.org>; Sat,  6 Jun 2015 17:51:08 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Z8dzmnbvfg2d for <tor-talk@lists.torproject.org>;
 Sat,  6 Jun 2015 17:51:08 +0000 (UTC)
Received: from ruggedinbox.com (ruggedinbox.com [94.156.77.238])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id E9084358F3
 for <tor-talk@lists.torproject.org>; Sat,  6 Jun 2015 17:51:07 +0000 (UTC)
Message-ID: <1811622581ef82fda947a8e82f54169f.squirrel@s4bysmmsnraf7eut.onion>
Date: Sat, 6 Jun 2015 19:50:32 +0200
From: torlove@ruggedinbox.com
To: tor-talk@lists.torproject.org
Mime-Version: 1.0
X-Priority: 3 (Normal)
Importance: Normal
Subject: [tor-talk] What's better than Tor for criminals?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hello...

I'm an avid tor lover and user.

I'm trying to understand a statement I've heard a number of people on the
Tor team and in the Tor community repeat over the years and was wondering
if it could be explained.

The statement: Paraphrasing, it's been said several times, by Roger, etc,
that...

"Criminals have much better options available to them than Tor for strong
internet anonymity."

I'm trying to understand what these options are and why don't we
non-criminal tech savvy people have some of these better options?

Is this just talking about the option of using encrypted botnets, or are
there other additional options that criminals use?

What are these criminal anonymity methods that are stronger than Tor?

Thanks all!

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

