Donate for the Cryptome archive of files from June 1996 to the present

15 June 2012. A sends:

Your headline reads "Tor Project to Phish 13M "Do Not Track" Users".

This is a misreading of what Mike Perry wrote. It's clear from context that "grab the entire "Do Not Track" userbase" is meant in the competitive sense, i.e. getting people who would otherwise only use the "do not track" cookies/headers to upgrade to better privacy using Tor.

Your headline is inappropriate.

_____

Cryptome: Tor is not what it is claimed to be. Do Not Track users should not be misled by its promises. This is not to discount that Do Not Track is also suspect: it is common for public interest intiatives to be co-opted if not designed for that to happen once public trust has been obtained. Phish is correct.

13 May 2012

Tor Project to Phish 13M "Do Not Track" Users


Date: Sun, 13 May 2012 14:26:59 -0700
From: Mike Perry <mikeperry[at]torproject.org>
To: tor-talk[at]lists.torproject.org
Subject: Re: [tor-talk] Tor Browser disabling Javascript anonymity set reduction

[Snip]

Concerns about Javascript are rooted in two avenues:

1. Fingerprinting concerns.

2. Zero-day exploits against Firefox.

The reason we feel that leaving Javascript enabled trumps these concerns is:

1. We want enough people to actually use Tor Browser such that it becomes less interesting that you're a Tor user. We have plenty of academic research and mathematical proofs that tell us quite clearly that the more people use Tor, the better the privacy, anonymity, and traffic analysis resistance properties will become.

In fact, my personal goal is to grab the entire "Do Not Track" userbase from Mozilla. That userbase is probably well in excess of 12.5 million people:

http://www.techworld.com.au/article/400248/

I do *not* believe we can capture that userbase if we ship a JS-disabled-by-default browser.

2. Exploitable vulnerabilities can be anywhere in the browser, not just in the JS interpreter. We disable and/or click-to-play the known major vectors, but the best solutions here are providing bug bounties (Mozilla does this; we should too, if we had any money) and sandboxing systems (Seatbelt, AppArmor, SELinux).

Hope this clarifies some things for you.

--

Mike Perry

_____________________________________

tor-talk mailing list
tor-talk[at]lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk