[OPLIN 4cast] OPLIN 4cast #403: Tor privacy
Editor
editor at oplin.org
Wed Sep 17 10:30:16 EDT 2014
Email not displaying correctly? View it in your browser.
<http://www.oplin.org/4cast/>
OPLIN 4Cast
OPLIN 4cast #403: Tor privacy
September 17th, 2014
Tor onion logoOver the weekend, Boing Boing published a piece about
libraries in Massachusetts that are using the Tor browser on their
public PCs to protect patron privacy. If you're not familiar with Tor,
it is free software that allows users to browse the Internet
anonymously. It's sometimes called "the onion router" because it sends
browser requests through a roundabout network, hiding the original
computer within layers of other computers, somewhat like the layers on
an onion. Tor has also been in other news recently because of a claim
that some employees of government spy agencies - like the National
Security Agency (NSA) - have been helping Tor by passing them
information about security breaches spies have used. If true, that would
be an interesting development. But is it true?
* Radical Librarianship: how ninja librarians are ensuring patrons'
electronic privacy
<http://boingboing.net/2014/09/13/radical-librarianship-how-nin.html> (Boing
Boing | Alison Macrina and April Glaser) "Others have installed
Firefox with privacy-protecting browser plugins like Disconnect.me
<https://disconnect.me/>, Ad-Block Plus
<https://adblockplus.org/en/firefox>, and The Electronic Frontier
Foundation's HTTPS Everywhere <https://www.eff.org/https-everywhere>
and Privacy Badger <https://www.eff.org/privacybadger> tools. Still
more are setting up Tor middle relays on their libraries' networks.
One librarian said that the workshop made her feel 'thoroughly
empowered...[to] help stop illegal surveillance against my patrons.'
Amazing."
* NSA and GCHQ agents 'leak Tor bugs', alleges developer
<http://www.bbc.com/news/technology-28886462> (BBC News | Leo
Kelion) "The allegations were made in an interview given to the BBC
by Andrew Lewman, who is responsible for all the Tor Project's
operations. He said leaks had come from both the UK Government
Communications Headquarters (GCHQ) and the US National Security
Agency (NSA). By fixing these flaws, the project can protect users'
anonymity, he said. 'There are plenty of people in both
organisations who can anonymously leak data to us to say - maybe you
should look here, maybe you should look at this to fix this,' he
said. 'And they have.'"
* How Tor's dark web is getting darker thanks to spies
<http://wallstcheatsheet.com/technology/how-tors-dark-web-is-getting-darker-thanks-to-spies.html/>
(Tech Cheat Sheet | Natalie Shoemaker) "Covert operations, like
GCHQ, 'heavily relies on Tor working to be able to do a lot of their
operations,' according to Lewman. But there's also a seedy
underbelly of child porn and illegal drug sales. You have to take
the good with the bad if you want to protect your privacy these
days. There are over 150 million people who have downloaded the
browser in the past year, of which 2.5 million use it each day. It's
important to consider the people who are in dire situations, people
who may be fighting against oppression that rely on networks like
these-the 'dark web'-in order to stay hidden and protected."
* Are government spies tipping off Tor?
<http://www.toptechnews.com/article/index.php?story_id=021000Q2VYYR>
(Top Tech News | Jennifer LeClaire) "He [Tyler Reguly, director of
security research for Tripwire] told us this isn't the first time
that this topic has been discussed and no one should be naive enough
to think that it will be the last. 'Just a few weeks ago questions
were raised about the safety of Tor. Stating that these
organizations are assisting in increasing Tor's safety is the
perfect marketing ploy,' Reguly said. 'The statements can't be
verified and they help reduce concerns regarding privacy breaches
while using Tor.'"
*/Articles from Ohio Web Library <http://ohioweblibrary.org>:/*
* Fully non-interactive onion routing with forward secrecy.
<http://web.b.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=763f0a86-dd90-4cd7-8d97-cf6a5aabd03d%40sessionmgr112&vid=0&hid=123&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=84936171>
(/International Journal of Information Security/, Feb. 2013, p33-47
| Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro,
and Orazio Puglisi)
* Saving privacy.
<http://web.b.ebscohost.com.proxy.oplin.org/lrc/detail/detail?sid=31502177-e2d3-4540-8ded-5da64bb7df74%40sessionmgr111&vid=0&hid=123&bdata=JnNpdGU9bHJjLWxpdmU%3d#db=lfh&AN=95922915>
(/Boston Review/, May/June 2014, p14-31 | Reed Hundt, Marvin Ammori,
Adam Kern, Richard M. Stallman, Rebecca MacKinnon, Archon Fung,
Frank Pasquale, Jennifer Granick, Bruce Schneier, Jeremy K. Kessler,
and Evgeny Morozov)
* Optimising node selection probabilities in multi-hop M/D/1 queuing
networks to reduce latency of Tor.
<http://web.b.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=a7f38a78-e4e4-4f73-b41a-8c691c1281e4%40sessionmgr113&vid=0&hid=123&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=97496815>
(/Electronics Letters/, 8/14/2014, p1205-1206 | S. J. Herbert, S. J.
Murdoch, and E. Punskaya)
------------------------------------------------------------------------
The */OPLIN 4cast/* is a weekly compilation of recent headlines, topics,
and trends that could impact public libraries. You can subscribe to it
in a variety of ways, such as:
* *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
subscribing to the following URL:
http://www.oplin.org/4cast/index.php/?feed=rss2.
* *Live Bookmark.* If you're using the Firefox web browser, you can go
to the 4cast website (http://www.oplin.org/4cast/) and click on the
orange "radio wave" icon on the right side of the address bar. In
Internet Explorer 7, click on the same icon to view or subscribe to
the 4cast RSS feed.
* *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
OPLINlist and OPLINtech) by subscribing to the 4cast mailing list at
http://mail.oplin.org/mailman/listinfo/OPLIN4cast.
OPLIN 4Cast
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20140917/40bcd7b4/attachment-0003.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: kubrickheader.jpg
Type: image/jpeg
Size: 38379 bytes
Desc: not available
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20140917/40bcd7b4/attachment-0003.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: onion.png
Type: image/png
Size: 17538 bytes
Desc: not available
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20140917/40bcd7b4/attachment-0003.png>
More information about the OPLIN4cast
mailing list