Delivery-Date: Sun, 21 Sep 2014 21:19:49 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,FREEMAIL_FROM,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 719881E0C10;
	Sun, 21 Sep 2014 21:19:47 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id DDFF02B9E7;
	Mon, 22 Sep 2014 01:19:43 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 97B7F2ADC9
 for <tor-talk@lists.torproject.org>; Mon, 22 Sep 2014 01:19:40 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id HwcC13t9Ho9n for <tor-talk@lists.torproject.org>;
 Mon, 22 Sep 2014 01:19:40 +0000 (UTC)
Received: from SNT004-OMC3S8.hotmail.com (snt004-omc3s8.hotmail.com
 [65.55.90.147])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 641682ACC9
 for <tor-talk@lists.torproject.org>; Mon, 22 Sep 2014 01:19:40 +0000 (UTC)
Received: from SNT146-W68 ([65.55.90.137]) by SNT004-OMC3S8.hotmail.com with
 Microsoft SMTPSVC(7.5.7601.22724); Sun, 21 Sep 2014 18:19:37 -0700
X-TMN: [FmcT/QmK4P24sFRjLya0nNCWwhS094Gs]
X-Originating-Email: [chewy0914@hotmail.com]
Message-ID: <SNT146-W681AC9F1D7A3E9D898399BA3B30@phx.gbl>
From: Ben Healey <chewy0914@hotmail.com>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
Date: Sun, 21 Sep 2014 19:19:37 -0600
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 22 Sep 2014 01:19:37.0718 (UTC)
 FILETIME=[46BEA960:01CFD603]
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] Tor Using Encryption-Safety Of Use+Tors Goal?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

How much data over the internet is encrypted?
I found an older article that said around 6%+?
How many individual pc's servers/other actually contribute to that? 
Give all encrypted traffic a higher priority? Monitor systems of all encrypted traffic producers?
Physically connect/other to system that if they rally can't be accessed over the networks?

I would think if a country with vast resources wanted to monitor any system; I would be pretty certain that all data that is wanted to be monitored is being monitored by someone?

So you that have not been whatever that are doing something that is deemed unlawful, those monitoring you don't care or don't have the task to do something about it.

Think CIA vs FBI or Local PD.... CIA/Other or a sub group probably can and may are on everyone's system no matter who you are. Do they care if you don't fit into their scope?

As for the limit of the tools given to those that are given the area to care about--illegal activity.
What are their tools? routes/other? 
The tools they are permitted to use? As in not pulled from them keeping from public use/view if every discovered/rediscovered?

So with all that, vast resourceful government or back government that violates the laws more than any citizen(s) could every compete with; they have a means if not many to find you.

So I guess to actually keep a network like Tor secure from everyone doesn't really matter?

But from those that do care?  
What are the ones who care about a Tor like net like?
What are their limits?
What would surpass them more?
If a certain level was passed would Tor be shut down? Getting into the Big Boys Territories? 
 		 	   		  
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

