Delivery-Date: Thu, 23 Oct 2014 14:47:55 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 492311E0B61;
	Thu, 23 Oct 2014 14:47:51 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 879FF31263;
	Thu, 23 Oct 2014 18:47:46 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id E767931240
 for <tor-talk@lists.torproject.org>; Thu, 23 Oct 2014 18:47:42 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id lI0UzCaxsh26 for <tor-talk@lists.torproject.org>;
 Thu, 23 Oct 2014 18:47:42 +0000 (UTC)
Received: from mail2.eff.org (mail2.eff.org [173.239.79.204])
 (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id C50DD31018
 for <tor-talk@lists.torproject.org>; Thu, 23 Oct 2014 18:47:42 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=eff.org;
 s=mail2; 
 h=In-Reply-To:Content-Type:MIME-Version:References:Message-ID:Subject:To:From:Date;
 bh=O4AI5R5Ca5BP7L7VcRa1Xnys/mQpfHgzGnhP7JLmxos=; 
 b=5QkKCYL7d+CvFf5QSpqRKU0CMdRiRxpzK8k/5V4wQByI8csi2VMRHc4LZTkvmn1OrmdPSqEcx1s1l/o1xNa/Tnbr3kKE+YJ9OVkMfgTNREMMm/s2u3ehFzYjBsH46n99JWGYGsZK97Hz/gzz1/r+QZFcGrAROMpvEaJUZqtqqoM=;
Received: ; Thu, 23 Oct 2014 11:47:39 -0700
Date: Thu, 23 Oct 2014 11:47:39 -0700
From: Seth David Schoen <schoen@eff.org>
To: tor-talk@lists.torproject.org
Message-ID: <20141023184739.GF23933@mail2.eff.org>
References: <005d01cfeef0$b0a5a080$11f0e180$@alizeepathology.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <005d01cfeef0$b0a5a080$11f0e180$@alizeepathology.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [tor-talk] Tor in other software
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Derric Atzrott writes:

> Good day all,
> 
> Would it be useful at all, when developing other software,
> to route its communications through Tor?
> 
> I'm mostly just curious if it would be useful to the Tor
> project to design software that makes use of Tor in order
> to help provide more cover traffic for the Tor network.

There was just a new article suggesting that using Tor can be
counterproductive for Bitcoin:

http://arxiv.org/abs/1410.6079

There's an older article suggesting that it's also a problem for
BitTorrent:

https://www.usenix.org/legacy/event/leet11/tech/full_papers/LeBlond.pdf

Maybe the lesson of this is that applications starting with "Bit-"
have anonymity risks from using Tor. :-)

More seriously, the Tor Project has traditionally encouraged people
to make various things run over Tor, and there are definitely things
that run over Tor other than web browsing, including TorBirdy, Pond,
and OnionShare (which is sort of web browsing).

I think it would be great if someone who's read both the "Bad Apple" and
the "Bitcoin over Tor" papers could explain if there are any generalizable
lessons about exactly what makes it risky to run a particular service
over Tor.  Maybe that could help future developers make better choices
about how to use Tor.

-- 
Seth Schoen  <schoen@eff.org>
Senior Staff Technologist                       https://www.eff.org/
Electronic Frontier Foundation                  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109       +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

