Delivery-Date: Thu, 28 May 2015 06:39:03 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 4C9C71E0693;
	Thu, 28 May 2015 06:38:58 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 4650435A9C;
	Thu, 28 May 2015 10:38:51 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 2D5DF35A98
 for <tor-talk@lists.torproject.org>; Thu, 28 May 2015 10:38:48 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id s2ywJDbS1oK9 for <tor-talk@lists.torproject.org>;
 Thu, 28 May 2015 10:38:48 +0000 (UTC)
Received: from khazad-dum.seul.org (khazad-dum.csail.mit.edu [128.31.0.47])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "moria.seul.org", Issuer "moria.seul.org" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 1171035A97
 for <tor-talk@lists.torproject.org>; Thu, 28 May 2015 10:38:48 +0000 (UTC)
Received: by khazad-dum.seul.org (Postfix, from userid 501)
 id 846541E0693; Thu, 28 May 2015 06:38:45 -0400 (EDT)
Date: Thu, 28 May 2015 06:38:45 -0400
From: Roger Dingledine <arma@mit.edu>
To: tor-talk@lists.torproject.org
Message-ID: <20150528103845.GO7800@moria.seul.org>
References: <40afdbeb347695aeb1cbbaaea24b2eb8@cryptoisimportantto.me>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <40afdbeb347695aeb1cbbaaea24b2eb8@cryptoisimportantto.me>
User-Agent: Mutt/1.5.20 (2009-12-10)
Subject: Re: [tor-talk] A thought experiment on direct action
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Thu, May 28, 2015 at 10:05:26AM +0100, Just Talkin' wrote:
> All this would be very abusive of other people's paid-for Internet
> connections, and very anti-social!

Sounds to me like a great way to make more people think that Tor exit
relays are immoral antisocial things, and that anything related to Tor
is a criminal plague that any good sysadmin should try to get rid of.

We're in a fight for public opinion here, and anything that makes
more people think that when they discover Tor, it is a malicious
infection that they should get rid of... will hurt the ordinary people
who need Tor for their continued safety.

And if that argument doesn't convince you :), consider also that very
fast Tor relays are much more useful to the network than slower ones.
You're unlikely to sneak a Tor relay into a stable 100mbit connection, or
if you do, it won't very long, and worse, you'll make that ISP hate Tor.

This last point reminds me of my "slash-and burn agriculture" analogy
for relay hosting:
https://lists.torproject.org/pipermail/tor-relays/2013-November/003240.html

>  But could it be effective as a
> "civil disobedience" campaign to get authorities to permit (and even
> protect) the rights of people to operate exit nodes so we wouldn't
> have to steal other people's connections but could openly operate
> them without harassment?  Or would it just not work?  Or cause a
> backlash?

Ah ha -- I think I've figured out the disconnect. Exit relays aren't
scarce because of governments that don't permit them. Exit relays are
scarce because ISPs are nervous to let people run them. It's a social
(ok, and economic) thing, not a legal thing.

--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

