forgive me for hurry typing. On Sun, May 3, 2015 at 10:28 AM, benjamin barber <barb...@barberb.com> wrote:
> Its already been discussed that VPN services and i2p are more secure for > passing data unbeknownst to others, not even to mention the merits of the > dir auths, and how they were being ddosed by lizard squad or were being > seized. > > > https://blog.torproject.org/blog/possible-upcoming-attempts-disable-tor-network > > AFAIK i have never heard the explanation behind the onymous arrests, but > when the TOR leadership associates with Randi Harper and Lorrelai. > > In the end, we're all known by the company that we keep. Tor members seem > to be making alot of ties to government and telecom, and associates with > people like randi harper and lorrelai as well. > > Like i said in a previous thread, i was working on building tor hidden > services, and now I no longer care to help tor at all, i'd rather wash my > eyes with bleach, nice concept but wrong team and wrong implementation. > > On Sun, May 3, 2015 at 2:02 AM, coderman <coder...@gmail.com> wrote: > >> On 5/3/15, benjamin barber <barb...@barberb.com> wrote: >> > Except that TOR says they're going to help LEO with stop cyber criminals >> > according to briefings with UK parliament. >> >> what part of "Will never compromise Tor" do you not understand? >> educating law enforcement does not equate to capitulating to calls for >> backdoors or weaknesses. >> >> when the control port flaw was disclosed, a patch was committed within >> 8 hours - while Tor people were on the road at a security conference. >> this is a record turn-around for any defect i have been involved with. >> in terms of technical measures for security, Tor has a great track >> record - even compared to projects with ten times their resources. >> >> >> >> > Thats not to mean that Tor is a government honeypot but its not secure >> > enough, but if the government makes tor popular people will not be >> > persuaded to more effective models. >> >> Tor _is_ the most effective model deployed. there are a great many >> ideas about making it even better, and i don't see how Tor being >> popular precludes making it better. >> >> take a look at the datagram Tor related research to see just how >> difficult / complicated some of these problems are. >> (userspace stacks, congestion controls, padding and reordering, etc... ) >> >> pro-active security posture, prompt resolutions to serious security >> issues, attentive to new research and actively engaged with >> educational and professional organizations. >> >> any of these aspects speak well of Tor itself and the Tor Project around >> it. >> >> perhaps disagreement based in technical merit should have been >> requested. do you have any? >> >> >> best regards, >> -- >> tor-talk mailing list - tor-talk@lists.torproject.org >> To unsubscribe or change other settings go to >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk >> > > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk