[Noisebridge-discuss] Anti-piracy / anti-Pirate Bay law currently in Congress
Glen Jarvis
glen at glenjarvis.com
Tue Sep 28 15:38:07 UTC 2010
May I a tangential small question? From reading thus thread, I saw requests for line breaks in email.
I saw a response that, due to arthritis, this isn't done.
But I also see the person with arthritis is a developer. How does one write a lot of code without line breaks? Are semicolons used instead? Are semicolons easier to type than a carriage return? How readable is that code?
Just curious.... And not directly related to this message (but it is to this thread)...
Glen
> Wow, the only assertion I made was that TOR is compromised and you basically just told everyone to completely ignore what I've said. Look, I know you're passionate about TOR and that's great - you guys made a really cool suite of software but don't take this wrong when I say this because I don't mean it as a personal slight. You're naive. You think that it's okay to run an exit node and it's wrong to push people in the direction not to run exit nodes, even in the case that they will have their computers taken and have charges pending against them and be forced to spend money out of pocket to promote anonymity. That's a dream that we all have - no consequences. The reality is that things do happen to people and I don't really care if the guy from Germany became a developer for TOR after he had gone through hell with the law. The relevant fact is, he did go through hell with the law and everyone sane looking out for their own survival should consider that not running an exit node would be and is a good decision. It's stupid to endanger yourself for a cause that's dead before it's gotten off the ground. Personally, I'm not going to a privacy-martyr and I don't think anyone else should ever consider it. Are you saying that with the TOR code not being compromised that it equates to saftey? Can't TOR developers find users causing problems or possibly a law enforcement exit-node honeypot set up to be used to catch users causing problems? With encryption export laws, current attitudes of law and requests made to companies and groups dealing in security by governments, are we wrong to hold the TOR network suspect because we don't understand or haven't looked at the source code? I believe your statement regarding that there is no backdoor but I still won't take your word for it and I honestly don't have the time to look over the code or search for novel, new exploits that have yet to be found that would reveal TOR users' identities. I didn't state that there is one, I said that there I don't trust it and there might possibly be one. That's an opinion, logically based upon other events that are ongoing in global use of the Internet and technologies. <sarcasm on> But you're right, "TOR anonymity" is more important than my possible legal fees or spending a week in jail until it's figured out that it wasn't me accessing whatever it was that I could be arrested for. <sarcasm off>. But then again because you refuted me by stating that everything I stated was bullshit and of course you proved your point by stating you're a TOR dev so you must be right by way of having authority on the subject. I don't find you to be objective in your criticism, but "that's only my opinion" based upon you being a dev and how passionate you seem to be. If I was going to make a claim like "it's backdoored", I would've posted code to back it up and not speculated based upon many other things in the world. It's not as if our government were capable on spying on all of us if they wanted in many ways, is it? :P I'd say my statements are correct, sane and hold the best interest of TOR users who might run an exit node first and the EFF and their "campaign for privacy" second but really showed that I care for both.
>
>
> I sometimes wonder if people think that poking fun at my signature or stating that it's idiotic means a damned thing beyond that they were pretty much mentally masturbating to the fact that they could insult the fact that I have it in my e-mails. Glad I could help you get off. It's not so much an ice-breaker to me as one might think as it is a tell of where your mind is and where you come from that you'd waste energy and time on it.
>
> On Tue, Sep 28, 2010 at 12:38 AM, Jacob Appelbaum <jacob at appelbaum.net> wrote:
> On 09/27/2010 10:31 PM, Ronald Cotoni wrote:
> > I am sure you are right that TOR has been compromised. I would suggest
> > taking a look at the source http://www.torproject.org/download.html.en. You
> > can download it there and then confirm or deny this. It should be fairly
> > trivial for you to do this. A lot of other projects are open source as well
> > that you can use for encryption on top of tor (a vpn service over tor for
> > example if you are super paranoid)
>
> Yes, feel free to audit Tor - we'd love to hear about any bugs or issues
> that you've found.
>
> >
> > Other than that you are right, you
> > should NEVER do something that you wouldn't do in the open over tor or any
> > other service. It is just douchy and well wrong.
>
> What? He's basically incorrect in everything that he's said - he knows
> basically nothing on the topic, offers no evidence, makes tons of bogus
> assertions, and then encourages people to stop helping. WTF?
>
> There are lots of reasons to use Tor:
> https://www.torproject.org/torusers.html.en
>
> All the best,
> Jake
> _______________________________________________
> Noisebridge-discuss mailing list
> Noisebridge-discuss at lists.noisebridge.net
> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
>
> _______________________________________________
> Noisebridge-discuss mailing list
> Noisebridge-discuss at lists.noisebridge.net
> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.noisebridge.net/pipermail/noisebridge-discuss/attachments/20100928/2f1c6d81/attachment-0003.html>
More information about the Noisebridge-discuss
mailing list