Ethical Tor

Steve Kinney admin at pilobilus.net
Wed Nov 11 12:38:37 PST 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/11/2015 02:27 PM, Ryan Carboni wrote:
> https://blog.torproject.org/blog/ethical-tor-research-guidelines
>
>  Interesting problem: to use Tor is to say you trust your ISP
> less than some pseudorandom person over the internet.

My ISP is a proven malicious actor, actively cooperating with even
more malicious actors.  Whether and how this is relevant depends
entirely on the threat model I am addressing:  Specific assets vs.
known classes of adversaries, in the context of my use case.




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=r3/W
-----END PGP SIGNATURE-----



More information about the cypherpunks mailing list