[LINK] Browse the web anonymously with Torpark
Bernard Robertson-Dunn
brd at iimetro.com.au
Thu Sep 21 19:37:00 AEST 2006
Suppose (fill in the name of an organisation you REALLY don't trust)
owns (or has significant connections with) Tor? As well as pushing
payloads out onto the net anonymously, they could also send off to a
secret bunker or mountain lair, the payload along with everything they
know about the originator, the main fact being the origination IP address.
I know it's a trust/risk thing but the trade off is that the more you
trust, the more you risk.
And as that old actor Ronald Reagan said in his Farewell Address to the
Nation, January 11, 1989:
"It's still trust but verify. It's still play, but cut the cards. It's
still watch closely. And don't be afraid to see what you see."
http://www.reaganfoundation.org/reagan/speeches/farewell.asp
Roger Clarke wrote:
> At 15:15 +0800 21/9/06, brd at iimetro.com.au wrote:
>
>> It's not the source code I'd worry about it's the bit about "encrypted
>> tunnel
>> from your computer indirectly to a Tor exit computer"
>>
>> Tor decrypts my comms and sends it out in the clear. Tor gets to find out
>> everything I do. Especially stuff I'm trying to hide.
>
>
> I haven't looked at this, and haven't got time to right now, but surely
> Tor accepts whatever payload is pushed at it? It's designed as a
> generic service, isn't it? Why would it want to know the content of the
> message? And how could it if it wanted to?
>
> [Please pinch/punch me hard if I'm being silly]
>
--
Regards
brd
Bernard Robertson-Dunn
Sydney Australia
brd at iimetro.com.au
More information about the Link
mailing list