Delivery-Date: Sat, 21 May 2016 14:02:39 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [138.201.14.202])
	(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 700D81E039D;
	Sat, 21 May 2016 14:02:37 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 32BADE0511;
	Sat, 21 May 2016 18:02:32 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 3CE12E04CE
 for <tor-talk@lists.torproject.org>; Sat, 21 May 2016 18:02:28 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id jYNTfQNuSucr for <tor-talk@lists.torproject.org>;
 Sat, 21 May 2016 18:02:28 +0000 (UTC)
Received: from mout.kundenserver.de (mout.kundenserver.de [217.72.192.74])
 (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 1803DE04C9
 for <tor-talk@lists.torproject.org>; Sat, 21 May 2016 18:02:24 +0000 (UTC)
X-Greylist: delayed 335 seconds by postgrey-1.34 at eugeni;
 Sat, 21 May 2016 18:02:25 UTC
Received: from [192.168.0.194] ([95.62.203.29]) by mrelayeu.kundenserver.de
 (mreue103) with ESMTPSA (Nemesis) id 0LjcUK-1bfRpw12V6-00bXZh for
 <tor-talk@lists.torproject.org>; Sat, 21 May 2016 19:56:48 +0200
To: tor-talk@lists.torproject.org
From: juanjo <juanjo@avanix.es>
Message-ID: <5740A15F.7080009@avanix.es>
Date: Sat, 21 May 2016 19:56:47 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101
 Thunderbird/38.8.0
MIME-Version: 1.0
X-Provags-ID: V03:K0:RxGZft3Aa/JXl8apfeHPXGskwcoqGMcAoJMTyIAGiCKvuJ1ooaD
 HaR5Ro1cDewhZnLK+4m0cPSs1tx5dmEbrD5g+16dgXlS0y7YCtbPdKnY1aSD5u5XNIAYROw
 LdbV0HG/It5iuTGw/1gK36EPls7m1zGTJUMvxllT/mAhEe+aIjKhDfqhJfwF7FO/gNiHdtk
 yKuQ9MF5ZtKeyHq6OTvNg==
X-UI-Out-Filterresults: notjunk:1;V01:K0:FvFhL2Yxs2I=:96dmUXNryi5VIrNlDGFImQ
 dbtsi60QY8jz6Bild5zTMGuasgjkRw6ykkAWdc7jXl1fA80JntX0RkoM1hew2DoPcD1Yl6yIk
 GMwHQAsu1f50+B8mekpssnvHutrXaW6kpJ+p16VE9q3tr1cqW5D3KbXMBBJYqGck3CAKssx30
 gZr+MhW71L61Lzs75iPICZ9OU5zCbkoRopyRmi5ONuTETwakwiZ3EbMZruzy/RVZ7rVFw6hpW
 mTwyOHd1XiGuzG4dkAmqAmGBvj8biBh6CjqnCofTbPQcQ+Sr65luBW2AjU26hSN5vRRYC64nT
 thIzdlBvkShPUFp/+OV9ABQV7EgRIA6ScvM/zugiymYKyiIYcBjQgKNoT6Svu+hqnGgyk20mm
 fy8ipkNucVvogzwJFxfi/YuvFtn9xyhkikVdzcw1ELPWv0P7IKvfv9yCoOfnEWH7gU1KN5DAF
 0BBedSAUqrlPAxSjcHZ48v5XKwVB68gEi+N3R9HGf8ELgRZ7dUjRf+XywcRVT+MPFeqkc5fYY
 sdAaRsUakYAq6k5ZpJ2BO8cAmQ3zLBU3ub97hDRlNQnWNTy7Tpw+UrCplqGQf4B4vkJ57wp2y
 Ulj8xRfVPN93IgWixs1frbnkbcc3GUawj+VrXCL6cwcgoXhAbsclCwU2zkr56idOMhtZ0luem
 a8vYYkSOaVtrMy2WtaRY2/77W6ailYwhHmqrJpZ2LYMqxbNu0hPiRGdsbyo388+FaQloQQckq
 ggavCld8yjpPLJvb
Subject: [tor-talk] Some thoughts about Tor Project
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hello, I'm just a normal tech guy but I wanted to thank you all Tor
developers and contributors for your work. I know a project like Tor is
needed and it seems it will needed even more in the future. I know it
could be complicated when mass media and the people from the street just
say Tor is a nest for drugs, crimes and pedos but ignores all the good
it does to the world. So I just want to thank you for all your hard work
and sorry for my english if its bad sometimes...

After investigating how Tor works and how mass surveillance is spreading
I made a list of things that could be better:

-A circuit should never have all hops from the same country: days ago I
was on a web with the latest version of Tor Browser and I advised all
hops from the circuit were from the same country. This is bad, since
with bulk data collection and traffic analysis this country could
deanonymize me easily.

-Too much nodes in the same countries... yes, Tor network is controlled
by Germany, USA or France, as I said before if this three countries
implement bulk data collection and share it, maybe more than 50% of the
circuits and Tor users will be deanonymized... I know people just want
cheap VPS to install Tor nodes, but I think thats bad. We should advice
Tor node operators to move their nodes to other countries if possible...
or even a campaign with crowdfunding to create more nodes in countries
where there aren't many...

-Maybe we should think a way of introducing high latency features on
Tor, I know this is troublesome but we need to think a way to protect
people even if NSA and Europe works together against Tor users...

-What about Tor traffic obfuscation by default? I mean the traffic
between all Tor nodes. Will it help on something?

-What about using two circuits like I2P? It would be possible?

-More public libraries with Tor nodes. Great work with that, this
initiative should spread. And maybe how Tor Browser users can help the
network in the future being a relay...

-I heard making a pluggable transport work in a privileged port (less
than 1024) is a hard work. we have to fix it.

-Better node testing: I think some people is working on this already. I
mean more and better ways to test if a exit node is a bad exit, or if
any other node is making traffic shaping attack.

So this is it. Thank you all again for all your hard work and see you in
other time.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

