[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Rotor-general] Status
- To: "[email protected]" <[email protected]>
- Subject: [Rotor-general] Status
- From: grarpamp at gmail.com (grarpamp)
- Date: Fri, 16 Sep 2016 14:02:22 -0400
- Cc: [email protected]
- In-reply-to: <IxpUsKEYEY81Iyq52BDNBZ-F9EwlVNS12mDjQCBvGWjKIQxQe2RRP3d33Vveqg_nMXlKEqCbDCAPPQzofw2Ed_TMfRnSI-rsO11qPGDN1qc=@protonmail.ch>
- References: <IxpUsKEYEY81Iyq52BDNBZ-F9EwlVNS12mDjQCBvGWjKIQxQe2RRP3d33Vveqg_nMXlKEqCbDCAPPQzofw2Ed_TMfRnSI-rsO11qPGDN1qc=@protonmail.ch>
On Thu, Sep 15, 2016 at 7:02 PM, Joshua <joshua2014 at protonmail.ch> wrote:
> These
> types of vulnerabilities show why diversity is needed in the anonymous
> networking ecosystem.
Exactly. So long as on balance your network/app does not present a
weaker position overall... different sets and classes of bugs, threat / usage
models, and attack surfaces can be appreciated as not a bad thing in
that regard. Popularity, marketing / share, bandwagon, and even high
quality shouldn't cause people to forget the basics of not all in one basket.
Now and then I post on diversity (see pp3)...
https://lists.torproject.org/pipermail/tor-relays/2016-August/010082.html
And occaisionally mention, inexhaustively as time permits, some
examples (in this thread, some tor compatibles)...
https://lists.torproject.org/pipermail/tor-relays/2016-August/010112.html
https://trac.torproject.org/projects/tor/wiki/doc/ListOfTorImplementations
Anonymous overlay networks are still a new science and greenfield with
much research to be done and many oppurtunities to both start new
projects and see deprecated ones pass to history.
Ten years out, I doubt the prevailing network[s] and tech[s] will directly
inherit the torspec of today, but rather be an import of any useful ideas
from many network projects into a new one.