Delivery-Date: Mon, 13 Oct 2014 00:07:30 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 48B081E0A33;
	Mon, 13 Oct 2014 00:07:25 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id BA641312CA;
	Mon, 13 Oct 2014 04:07:20 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id D242E3140D
 for <tor-talk@lists.torproject.org>; Mon, 13 Oct 2014 04:07:15 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 3FKzhLzTMNjD for <tor-talk@lists.torproject.org>;
 Mon, 13 Oct 2014 04:07:15 +0000 (UTC)
Received: from contumacia.investici.org (contumacia.investici.org
 [IPv6:2002:b2ff:9023::1])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "smtp.autistici.org",
 Issuer "Autistici/Inventati Certification Authority" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 3AF5B312CA
 for <tor-talk@lists.torproject.org>; Mon, 13 Oct 2014 04:07:14 +0000 (UTC)
Received: from [178.255.144.35] (contumacia [178.255.144.35]) (Authenticated
 sender: griffin@cryptolab.net) by localhost (Postfix) with ESMTPSA id
 29274E8606; Mon, 13 Oct 2014 04:07:06 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cryptolab.net;
 s=stigmate; t=1413173231;
 bh=9rkAMkO8ddWQFbEASKTu+HNxybnb70hD8Jp0Sd3KM10=;
 h=Date:From:To:Cc:Subject:In-Reply-To:References;
 b=XaxEm0eWXT0gBN//LtH0wz9y2QolEHtns5L4CicsYJ19Fav6iM11ZIn0nvoozyNFj
 2hcb0Tj+ZELHj/oScd6Q25SRBJj9PziP0AdADbJvr7SaXZobJPzHMS/Ubwdv/9nOhj
 vf2Y2/mA6pKU3HGz/IRqri0cJOh5s2TPqDKx/bnw=
MIME-Version: 1.0
Date: Mon, 13 Oct 2014 00:07:05 -0400
From: Griffin Boyce <griffin@cryptolab.net>
To: tor-talk@lists.torproject.org
In-Reply-To: <CANLPe+M7utUa9Q=MzoC1E_tYkGg9WCK_ERGbAup20X8VbLkcpw@mail.gmail.com>
References: <597899488.3907271413062124086.javamail.root@ip-10-181-20-37.ec2.internal>
 <719492467.3957621413068678816.javamail.root@ip-10-181-20-37.ec2.internal>
 <canlpe+m-mqkbxc3jah5oggra7j-7ju-kj0tzj0z1ms8r0apgng@mail.gmail.com>
 <20141011231732.ge54413@moria.seul.org>
 <canlpe+nlookeocoyk6npy2tdzs+gmpyzqdntiyyqfphitwpvng@mail.gmail.com>
 <44BDACD3189.00000851beatthebastards@inbox.com>
 <c89dfc787bb0b5459316f6baaf85022a@cryptolab.net>
 <9e34afb55dc79c67e72a35f9faa431d0@cryptolab.net>
 <CANLPe+M7utUa9Q=MzoC1E_tYkGg9WCK_ERGbAup20X8VbLkcpw@mail.gmail.com>
Message-ID: <1c79d806d7a7d71f7ca3b00a10042591@cryptolab.net>
X-Sender: griffin@cryptolab.net
User-Agent: Roundcube Webmail
Subject: Re: [tor-talk] Tor Relay Smartphone App
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Casey Rodarmor wrote:
> I totally want one now. I am all for worldwide splendidness.
> I think a super worthy project might be to design and sell a minimum
> spec/size/power/price box pre-loaded with tor relay software.

   When I was working on Commotion [1], we had a few of these to run 
local applications on our mesh networks -- they were really reliable and 
withstood some serious abuse, which is why I recommend them.  But a 
couple of years ago, I bought a $35 refurbished Dell desktop with 1GB 
ram and ~1ghz processor, and it ran Tor relays beautifully.  One of the 
main benefits of the software is that so much work has gone into making 
it light and compatible with a myriad of systems, so that Tor doesn't 
*have* to manufacture new hardware.  There are lots of issues with 
hardware projects and it costs an obscene amount of money -- not to 
mention the implications on security and anonymity that it would 
introduce.

   I do agree that there should be a note about what a base level system 
looks like.  Most of the documentation is in the process of being 
rewritten, and this would be a great addition.  The discussions around 
what is the ideal minimum for a new tor node to contribute are ongoing, 
and will impact the recommendations.

> Create a disk image of a free operating system that boots and tries to
> run the best node it can with whatever hardware it happens to have. It
> might also try to upgrade and apply security patches to the operating
> system and get the latest version of tor.

   This could work, but would need a maintainer.  Lots of hosts have 
pre-made images for other uses, and there are projects like 
VirtualBoxes[2] that might be good places to distribute these.  An 
easier way would probably be to use something like a python/bash script 
or an ansible playbook to install dependencies, set permissions, and 
detect speed to configure the torrc.

> Raise as much money for the project as possible. We shall assume that 
> we
> are able to raise 1 hojillion US dollars.

   Just think of the amazing improvements to software and education we 
could do with a hojillion dollars! :D

> Spam computer manufacturers with the specs from #1

   The thing is, the ideal minimum specs to run a tor relay are really 
low.  Anything you can buy that *isn't* a raspi/beaglebone will probably 
do okay.  Even the Novena board can run relays.  Even refurbished $35 
computers can run relays.  This is a long-solved problem.  Tor doesn't 
need to solve it all over again.

> Revel in how awesome the internet is.

   Done and done.

> * Status light that shows when it's connected to the network, if it's
> firewalled, and when there is tor network activity, to debug and give 
> me
> the warm fuzzies that I'm helping internet freedom.

   James Vasile from OpenITP has a design in mind for a fire display 
attached to an ARM process. It's not very earth-friendly though ='(

TL;DR: Hardware projects are awful. That way lies dragons.

best,
Griffin

[1] https://commotionwireless.net/
[2] http://virtualboxes.org/

-- 
"I believe that usability is a security concern; systems that do
not pay close attention to the human interaction factors involved
risk failing to provide security by failing to attract users."
~Len Sassaman
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

