On 23/11/2019 23:23, Punk-Stasi 2.0 wrote:
My guess is that the main reason for them to get as many users as they can is to justify funding.
Initially the main reason was to increase traffic, in order to make traffic analysis harder. Really. I was around when the idea was first being discussed - Roger, Lucky, Paul (in a smaller role than often stated), Len, Nick, a few others - Matt dropped in occasionally, Ian and Caspar gave their 2c worth. For some reason George and Andrei (mixmaster/mixminion math gurus) weren't much involved. Justifying funding is just a nice side-effect. On 25/11/2019 11:03, grarpamp wrote:
any low-latency web onion router - could not defeat The Man
This seems yet to be lacking proof and perhaps cannot actually be said without it.
I thought I wrote that quite carefully, but perhaps I should rephrase it: "Any practical likely-to-be-successful low-latency web onion router cannot defeat The Man." While a proof of that is not available, I do not know how to do it - do you? Please tell. That was certainly the general conclusion of the crypto privacy/anonymity community at the time TOR was developed. My conclusion also, and I haven't seen anything since to make me change my mind. Low latency means that only a few seconds of traffic need be considered. Web means that users have lots of traffic repeats in time-defined patterns. These make traffic analysis resistance hard. Adding dummy cover traffic does not help until you use impractical levels of cover traffic, it is better to spend limited spare traffic resources on padding to make files the same size, even though this will not defeat The Man it does make his job harder. Dithering timing doesn't really help much against The Man's computing resources, at least until you get to something that is not low latency. ps by The Man I mean someone like NSA with widespread access to raw traffic and considerable computing resources. It should be noted that NSA do not say they can break TOR in practice, and afaik there is no evidence that they have. In all the "Dark Web" busts I have read about there has been no evidence presented as part of a general break in TOR. Maybe they can't (or just don't) break it. Of course, if they have broken TOR that is optimal for NSA - don't tell anyone it is broken, so people keep using it. Remember Coventry/Enigma (which never happened, but it is a good story). Never Say Anything. Peter Fairbrother