Delivery-Date: Thu, 28 May 2015 06:04:02 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 518731E03C5;
	Thu, 28 May 2015 06:04:00 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 4466335A8A;
	Thu, 28 May 2015 10:03:54 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id B013935A87
 for <tor-talk@lists.torproject.org>; Thu, 28 May 2015 10:03:50 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id SyAVw5-4sDml for <tor-talk@lists.torproject.org>;
 Thu, 28 May 2015 10:03:50 +0000 (UTC)
Received: from gamma2.srv2.com (gamma2.srv2.com [188.65.115.147])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 5C6BE359D8
 for <tor-talk@lists.torproject.org>; Thu, 28 May 2015 10:03:49 +0000 (UTC)
X-Greylist: delayed 3499 seconds by postgrey-1.34 at eugeni;
 Thu, 28 May 2015 10:03:50 UTC
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=cryptoisimportantto.me; s=default; 
 h=Message-ID:Subject:To:From:Date:Content-Transfer-Encoding:Content-Type:MIME-Version;
 bh=/WyyEVhLxa9EEyJgOI1o3rd67sQ9qqUqjj7zocFvENw=; 
 b=lBT2YAOHvUllUgZgoei55lLnRo1yycYwNGRCg7ugJbqj/mUVnwvFSCMW6RAbndf7Cm+KnMpQrE9YbwS0jzSg3CwhmiZwLiBJW6ixg6dYgypsBpoj0g19Jetp9fyCBpufOvs2kPsXchv++YIFRMQCB3QNkcQV+nI9jLznoakyKuk=;
Received: from orion ([127.0.0.1]:43079 helo=gamma.srv2.com)
 by gamma.srv2.com with esmtpa (Exim 4.85)
 (envelope-from <justtalk@cryptoisimportantto.me>) id 1Yxtkk-0001Ju-9J
 for tor-talk@lists.torproject.org; Thu, 28 May 2015 10:05:26 +0100
MIME-Version: 1.0
Date: Thu, 28 May 2015 10:05:26 +0100
From: Just Talkin' <justtalk@cryptoisimportantto.me>
To: <tor-talk@lists.torproject.org>
Message-ID: <40afdbeb347695aeb1cbbaaea24b2eb8@cryptoisimportantto.me>
X-Sender: justtalk@cryptoisimportantto.me
User-Agent: Roundcube Webmail/0.6
X-OutGoing-Spam-Status: No, score=-2.5
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - gamma.srv2.com
X-AntiAbuse: Original Domain - lists.torproject.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - cryptoisimportantto.me
X-Get-Message-Sender-Via: gamma.srv2.com: authenticated_id: cryptois/from_h
X-Source: 
X-Source-Args: 
X-Source-Dir: 
Subject: [tor-talk] A thought experiment on direct action
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

I have been wondering whether there has ever been a direct action 
campaign to try to install many, many Tor exit nodes?

Inspired by PirateBox, I am thinking of something like a pre-configured 
Tor exit node in a small device (plug computer, TL-WR710N, HDMI or USB 
stick computer, etc).  Which could then be secretly (without permission) 
installed in various places (public, semi-public, private) and would 
function as an exit node, using the location's internet connection.  
Examples might be a hotel, a cafe, an office, a railway station, a shop, 
etc.

If they became popular they might even provide enough deniability that 
sympathetic people might install them on their own connections (but deny 
all knowledge if trouble comes).

Of course, many would be quickly found and removed.  Others might find 
themselves behind restrictive firewalls.  But with some stealth 
capabilities some might manage to be useful for quite a long time.  
There are plenty of power points hidden under unused desks, in 
stairwells, behind cabinets.  A label saying "State Environment 
Authority Air Quality Monitoring - Do Not Remove" might be effective in 
many offices.  Higher tech stealth could include randomly changing MAC 
address to avoid blocking.  And many medium sized hotels and offices 
have IT staff who are over-worked and under-paid.

All this would be very abusive of other people's paid-for Internet 
connections, and very anti-social!  But could it be effective as a 
"civil disobedience" campaign to get authorities to permit (and even 
protect) the rights of people to operate exit nodes so we wouldn't have 
to steal other people's connections but could openly operate them 
without harassment?  Or would it just not work?  Or cause a backlash?

I am interested in people's views on how to create a successful 
campaign to make Tor exit nodes acceptable and common.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

