Tor

grarpamp grarpamp at gmail.com
Wed Jun 2 21:13:15 PDT 2021


> Whenever you make a big project that threatens the major stuff, people come
> in and mess it up, put others in powerful roles, send misleading
> communications, adjust websites and dialogues to change public impact,
> spend lots of money ... It's great to change that, but it's also just what
> happens.
>
> Tor's ability to leave functionality gaps hinges on its users being unable
> to take advantage of them easily themselves.

Further helped by Tor's not equally presenting known risks,
censoring, ultimately leaving users ignorant and unto wolves.

Tor client as code and tool is interesting and even useful in
what it does well, but its gaps are where hungry wolves
are ever more present.

> But if you can go into a community and creatively lobby more effectively
> than the people already do so, things change.

No one who does not tow the entire party line of Tor Project,
including now its wokeism which may seem to some observers
to be more important to Tor Project than its code and users,
can "go into" the Tor Project community and lobby for anything,
because the Tor Project Incorporated and all its minions
now censor all opposing, alternate, rational, etc views.
If they don't like you, they will co-opt your work later, they
will close all your perfectly valid enhancement tickets, they
will boot you out of project areas you contribute to, and
censor you off all their comms channels which used to
be uncensored but became inconveniently embarra$$ing
so they '"bricked them up"  -- Tor Project'.


> Revealing things repeatedly can also help.

Tor Project hypocritically bricked all their own supposedly
free speech venues, so no revealing questions will ever be
approved for posting, or answered, there anymore.


However, any journalist who wanted to ask Tor Project direct
pointed questions in public on camera could do so here
and at similar venues in the future...

https://www.rightscon.org/
June 7~11 2021
Host: Tor Project
Panel: Building strategies to diversify funds: stories from
organizations in the internet freedom community on
developing different fundraising strategies


They could also ask Tor Project why it let [or put] one of its
non-executive without-access thus not-in-the-know underlings,
up to dismissing and closing direct pointed FOI requests from
the users for corporate documents.


What are Tor pitching their funders with post Snowden,
do they tell them "Tor Stinks", that it still stinks now even
more against TA and that Tor wrote TA off its threat model?


> Maybe by measuring changes in torrent and other transfer
> speeds?  It's a small statistic, but once something's significant it's
> there to display.

Statistics, changes, bumps, waves, patterns, correlations,
imparting observable perturbations... that's the general form
of traffic analysis that tor is unable / unwilling to do much to
defeat, and that Tor Project still disinforms its users about...


"
Browse Privately.
Defend yourself against tracking and surveillance.
DEFEND AGAINST SURVEILLANCE
Tor Browser prevents someone watching your connection from knowing
what websites you visit. All anyone monitoring your browsing habits
can see is that you're using Tor.
The network is comprised of thousands of volunteer-run servers known
as Tor relays.
We ... defend your privacy online ...
Download Tor Browser to experience real private browsing without
tracking, surveillance
-- torproject.org, frontpage 2021
"


"
https://edwardsnowden.com/docs/doc/tor-stinks-presentation.pdf
TOP SECRET // COMINT // REL FVEY
We will never be able to de-anonymize all Tor users all the time.
We can increase our success rate ...
Expand number of nodes ... other partners ... GCHQ set up Tor nodes ...
...
Tor Stinks  -- NSA, presentation 2012
"

Parse those and other NSA quotes very carefully.

Then guess which among either Tor's defenses, or NSA et al's
attacks, have ***massively*** enhanced their capabilities over
the last 10 years since 2012...  ProTip: Tor did not.


"Critical mass of targets use Tor. Scaring them
away from Tor might be counterproductive. -- NSA"

Did Tor Project Incorporated ever post or keep the NSA
presentation about Tor's current weaknesses and
NSA et al's future attack efforts on its frontpage for
equal consideration by and benefit of all tor's users?
Do Tor Project Incorporated's paylings and other minions
ever say "Tor Stinks"?

Consider that, and that the last one that did got
excommunicated from Tor "community" and
erased from public view years ago.



Tor's design is static since 20+ years, there is little more
Tor can do to counter TA without changing user expectations
re traffic needs and or other semantics, thereby invalidating
those long-held parts of its marketing, thus effectively making
tor no longer tor.

Tor Project has vacuumed up much of the research, $$$, and
media over the last 20+ years. Allowing too much weight to
accumulate and remain in one centralized place like that is
a risk just like Fiat is...
Cryptocurrencies, which themselves were born 10+ years
after Tor Project Inc and its design were fixed in stone,
should have taught you that, and to then route and decentralize
around such risks into different new competing tech on par.

It's long past time for the world's remaining and upcoming independent
research, development, and deployment communities, to leave Tor
and to work on new futures in new encrypted overlay networks.

Tor is opensource, harvest from it whatever bits make sense.
Or go in entirely different directions.
Start those competitive projects.


More information about the cypherpunks mailing list