Pay for Play, Influence Peddling, Tor and Hillary/Russia

jim bell jdb10987 at yahoo.com
Tue Aug 2 22:21:06 PDT 2016



 From: juan <juan.g71 at gmail.com>
 To: cypherpunks at cpunks.org 
 Sent: Tuesday, August 2, 2016 9:16 PM
 Subject: Re: Pay for Play, Influence Peddling, Tor and Hillary/Russia
   
On Wed, 3 Aug 2016 04:00:12 +0000 (UTC)
jim bell <jdb10987 at yahoo.com> wrote:

>>> Perhaps the
>>> solution will be that the Tor project team will study how to insert
>>> "anti-bad-people"chaff into the Tor streams, increase the number of
>>> hops 

   > The number of hops is irrelevant because the tor network fails
   > 'at the edges'. It doesn't matter how many times you bounce
   > stuff inside the network since the traffic is 'correlated' when
   > it enters/leaves the network.
I wish I knew far more about Tor.  But it seems to me that you are describing one kind of attack, one that would be effective against a site sending/receiving a large number of packets.  Yes, that's significant, but I think if the sender tendedto limit the packets, it would be much harder to correlate in the way you describe.  Maybe others who know more will contribute a comment.I think people would like to guard against the possibility that these transfer siteswere somehow malicious, collecting data for correlations.  Having two transfersites rather than one would make the process less susceptible to that weakness.


>> (more to confuse the "bad people"; they confuse the hell out of
>> me!), etc.  Eventually, they will have to sadly announce that they
>> haven't yet fully succeeded  in preventing"bad people" from using
>> Tor, but they HAVE greatly improved security in various ways. 


 >   What makes you think that military contractors for the US
 >    military(i.e. tor) have any interest in improving the security >   of the enemies of the US gov't/military? 
 >   Tor works exactly as designed. It is a 'honeypot'.
PGP 1.0 also worked exactly as designed.  It was limited to keylengths of 1024 bits,as I recall, which no doubt Phil Zimmerman considered sufficient for a first attempt..  Eventually it was considered by others desireable to issue revisions allowing much-longer keylengths.  Does anybody claim that Zimmerman was intent on making ahoney-pot?  
Tor was/is a good start.  But it nevertheless should be improved
                   Jim Bell  
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 5847 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20160803/e625b32e/attachment-0002.txt>


More information about the cypherpunks mailing list