[HOME] [DOWNLOAD] [DOCS] [NEWS] [SUPPORT] [TIPS] [ISSUES] [DONATE]

Mentioning Privacy on the Internet is Illegal

[html]

Did you know that merely visiting the Tor website or any place where Linux, data anonymity,privacy or security is mentioned, is enough to earn you a place in a NSA database? Meaning our communications will be retained indefinitely in their data centers.

This of itself is nothing new. We know that everything is already collected anyway, so looking really, really, really hard at encrypted Tor traffic shouldn’t change anything.

What is truly interesting and alarming about this news is their internal view of netizens. Criminalization of knowledge and privacy, where even trying to understand such topics puts anyone and everyone under unreasonable suspicion. Going far enough to be labeled as extremists.

As users who value our anonymity and basic human right to privacy, this should strengthen our resolve to keep developing and using robust counter-surveillance measures like Whonix and to educate more people about how their basic values are stake and how they can safeguard them.

[/html]

Yes, I noticed it, because they are discussing it on the tor-talk mailing list.

They’re overusing the term “extremist”. In the Good Old Days ™ extremists were defined as people who considered or used violence to reach their goals, wanted to abolish democracy (the thing they are telling us we have), build dictatorship (of person, not capital), wanted to build camps where they incarcerate people without accusation, legal defense, court and with torture.

This is just another symptom of capitalism. Machines are doing big part of all available work. (Great! Thanks!) Politicians tell us they want to do policy of full employment while they do policy of zero employment, because when a company buys a machine they can write off against tax, but when they employ a human, they have to pay social insurance. There is a constant (wanted? welcome?) lack of jobs, people are fighting over jobs. Everyone is selling herself cheaper than someone else just to get the job.

To compensate people are making up their own work. Complicate the tax form some more, get more bureaucracy, cause some more work for lawyers and courts, and your income is secured. This is one symptom. Another symptom is NSA. When there is a lack of enemies, you must make some up to secure your job. And in medicine, why find a cure when there is an expensive long term therapy. A cure would only gross domestic product, that’s “bad”. [Getting ironic.*] So let’s rather do some more planned obsolescence and waste of scare recourses so we can start another war for recourses. I mean, tanks and munitions are piling up. What shall we do? Stop producing losing profits? Why not use some to get rid of them. [/Ironic off.]

  • Only marking explicit as ironic so no one who wants to misunderstand will be able to.
Another symptom is NSA. When there is a lack of enemies,

They are making enemies of everybody by shutting down legitimate avenues of political expression, accountability and outlawing whistle-blowing. The only reason they would go to that extent and pains to monitor everyone, but especially the American people, is to quell any unrest that happens in response to totalitarian behavior.

Over time, even the NSA’s own employees have become skeptical of the organization’s intentions and purpose.


From what I have seen in this article, I think an important direction to move towards is to concentrate on pluggable transport chaining: where obfsproxy hides that Tor is being used while flashproxy makes use of undocumented bridges - combining the benefits of both is possible. And in the future we could strongly recommend this setup or enable it by default.

On a related note, would you like to add the flashproxy facilitator address to the pages of the Whonix site?

If so here is how:

https://crypto.stanford.edu/flashproxy/#badge-howto

It sounds interesting. There is a lot to say about this .Feel free to open a new thread.

For legal reasons, it’s best that the people who are developing Tor-related software are not hosting the network as well. This is torproject.org’s strategy and I think we should copycat this here.

[Imprint] [Privacy Policy] [Cookie Policy] [Terms of Use] [E-Sign Consent] [DMCA] [Investors] [Priority Support] [Professional Support]