Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged tor

Rss Feed Group items tagged

Tyler Sax

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...13 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
    • Tyler Sax
       
      Good quote
  • technology exists to circumvent internet censorship
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • 1 billion people are online in some way
  • In the 1930s, the feds and police warned of mass chaos if the interstate highway system was built in the US. The ability for criminals to quickly transit between cities was of grave concern.
    • Tyler Sax
       
      I like this analogy about internet security
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 0 views

  • Reading the New Yorker’s piece on WikiLeaks, it’s hard to decide whether I’m reading about freedom fighters, skilled propagandists, or as is often the case, both.
  • The Tor Project blog responds, pointing out that Tor doesn't magically encrypt text, it simply allows for the anonymous transfer of files. So if you use unsecure connections and send data in plain text, it's just as safe as writing down the information on a piece of paper, folding it into an airplane, and throwing it across the street.
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 1 views

  • Before launching the site, Assange needed to show potential contributors that it was viable. One of the WikiLeaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments’ information, and began to record this traffic. Only a small fraction has ever been posted on WikiLeaks, but the initial tranche served as the site’s foundation, and Assange was able to say, “We have received over one million documents from thirteen countries.”
    • Tom Zorc
       
      So China's hacking the Tor network to obtain the docs that Assange is going to release anyways...? 
Tom Zorc

Plaintext over Tor is still plaintext | The Tor Blog - 1 views

  • I write to remind our users, and people in search of privacy enhancing technology, that good software is just one part of the solution.
  • We hear from the Wikileaks folks that the premise behind these news articles is actually false -- they didn't bootstrap Wikileaks by monitoring the Tor network.
Tyler Sax

WikiLeaks Was Launched With Documents Intercepted From Tor | Threat Level | Wired.com - 0 views

  • WikiLeaks, the controversial whistleblowing site that exposes secrets of governments and corporations, bootstrapped itself with a cache of documents obtained through an internet eavesdropping operation by one of its activists, according to a new profile of the organization’s founder. The activist siphoned more than a million documents as they traveled across the internet through Tor, also known as “The Onion Router,” a sophisticated privacy tool that lets users navigate and send documents through the internet anonymously.
    • Tyler Sax
       
      This is an interesting note about something that isn't taled about very often -- where did Wikileaks come from in the first place?
  • The siphoned documents, supposedly stolen by Chinese hackers or spies who were using the Tor network to transmit the data, were the basis for WikiLeaks founder Julian Assange’s assertion in 2006 that his organization had already “received over one million documents from 13 countries” before his site was launched, according to the article in The New Yorker.
  •  
    (This article seems to have been debunked by another I bookmarked)
  •  
    (This article seems to have been debunked by another I bookmarked)
Randall Bass

five minutes to speak | The Tor Blog - 4 views

  •  
    Interesting brief talk about Internet security and the role of proxy technologies, esp under repressive regimes. Though check out the comments too. Clearly there are downsides and social hazards to proxy technologies too.
1 - 6 of 6
Showing 20 items per page