> On 19 Jan 2016, at 04:53, Evan d'Entremont <e...@evandentremont.com> wrote:
> 
> What threat is Tor trying to defeat? Region locking or nation states? If the 
> former, then great, select an exit country, or just use a VPN. If the latter, 
> perhaps that actual threat profile should be taken into account.
> 
> Is there any reason why Tor doesn't select exit nodes which are as close as 
> possible to the intended host?
> 
> If I connect to Tor and request a resource from a server on ISP A, would in 
> not make sense to enforce an exit node also on ISP A, or if not, as close as 
> possible?
> 
> As well, entry guards should be as close as possible to the user, limiting 
> the ability of others to log the connection.
> 
> In short, it's safer that only my ISP see a connection rather than my ISP, a 
> backbone provider, the entry guard's ISP, etc. Systems like XKeyscore 
> wouldn't even see the traffic in this case. It seems that selecting an exit 
> country may actually be detrimental to anonymity by forcing traffic over the 
> (monitored) internet backbone.

It depends on your threat model.

My country requires ISPs to retain connection information, so choosing a nearby 
entry to me, and a nearby exit to a website in this country, would be very 
detrimental to my anonymity.

Tim

Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP 968F094B

teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to