[Noisebridge-discuss] Anti-piracy / anti-Pirate Bay law currently in Congress

Thomas Stowe stowe.thomas at gmail.com
Tue Sep 28 06:04:15 UTC 2010


Wow, the only assertion I made was that TOR is compromised and you basically
just told everyone to completely ignore what I've said. Look, I know you're
passionate about TOR and that's great - you guys made a really cool suite of
software but don't take this wrong when I say this because I don't mean it
as a personal slight. You're naive. You think that it's okay to run an exit
node and it's wrong to push people in the direction not to run exit nodes,
even in the case that they will have their computers taken and have charges
pending against them and be forced to spend money out of pocket to promote
anonymity. That's a dream that we all have - no consequences. The reality is
that things do happen to people and I don't really care if the guy from
Germany became a developer for TOR after he had gone through hell with the
law. The relevant fact is, he did go through hell with the law and everyone
sane looking out for their own survival should consider that not running an
exit node would be and is a good decision. It's stupid to endanger yourself
for a cause that's dead before it's gotten off the ground. Personally, I'm
not going to a privacy-martyr and I don't think anyone else should ever
consider it. Are you saying that with the TOR code not being compromised
that it equates to saftey? Can't TOR developers find users causing problems
or possibly a law enforcement exit-node honeypot set up to be used to catch
users causing problems? With encryption export laws, current attitudes of
law and requests made to companies and groups dealing in security by
governments, are we wrong to hold the TOR network suspect because we don't
understand or haven't looked at the source code? I believe your statement
regarding that there is no backdoor but I still won't take your word for it
and I honestly don't have the time to look over the code or search for
novel, new exploits that have yet to be found that would reveal TOR users'
identities. I didn't state that there is one, I said that there I don't
trust it and there might possibly be one. That's an opinion, logically based
upon other events that are ongoing in global use of the Internet and
technologies. <sarcasm on> But you're right, "TOR anonymity" is more
important than my possible legal fees or spending a week in jail until it's
figured out that it wasn't me accessing whatever it was that I could be
arrested for. <sarcasm off>. But then again because you refuted me by
stating that everything I stated was bullshit and of course you proved your
point by stating you're a TOR dev so you must be right by way of having
authority on the subject. I don't find you to be objective in your
criticism, but "that's only my opinion" based upon you being a dev and how
passionate you seem to be. If I was going to make a claim like "it's
backdoored", I would've posted code to back it up and not speculated based
upon many other things in the world. It's not as if our government were
capable on spying on all of us if they wanted in many ways, is it? :P I'd
say my statements are correct, sane and hold the best interest of TOR users
who might run an exit node first and the EFF and their "campaign for
privacy" second but really showed that I care for both.


I sometimes wonder if people think that poking fun at my signature or
stating that it's idiotic means a damned thing beyond that they were pretty
much mentally masturbating to the fact that they could insult the fact that
I have it in my e-mails. Glad I could help you get off. It's not so much an
ice-breaker to me as one might think as it is a tell of where your mind is
and where you come from that you'd waste energy and time on it.

On Tue, Sep 28, 2010 at 12:38 AM, Jacob Appelbaum <jacob at appelbaum.net>wrote:

> On 09/27/2010 10:31 PM, Ronald Cotoni wrote:
> > I am sure you are right that TOR has been compromised.  I would suggest
> > taking a look at the source http://www.torproject.org/download.html.en.
>  You
> > can download it there and then confirm or deny this.  It should be fairly
> > trivial for you to do this.  A lot of other projects are open source as
> well
> > that you can use for encryption on top of tor (a vpn service over tor for
> > example if you are super paranoid)
>
> Yes, feel free to audit Tor - we'd love to hear about any bugs or issues
> that you've found.
>
> >
> > Other than that you are right, you
> > should NEVER do something that you wouldn't do in the open over tor or
> any
> > other service.  It is just douchy and well wrong.
>
> What? He's basically incorrect in everything that he's said - he knows
> basically nothing on the topic, offers no evidence, makes tons of bogus
> assertions, and then encourages people to stop helping. WTF?
>
> There are lots of reasons to use Tor:
> https://www.torproject.org/torusers.html.en
>
> All the best,
> Jake
> _______________________________________________
> Noisebridge-discuss mailing list
> Noisebridge-discuss at lists.noisebridge.net
> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.noisebridge.net/pipermail/noisebridge-discuss/attachments/20100928/90afca5a/attachment-0003.html>


More information about the Noisebridge-discuss mailing list