Talk:Boy Talk Media

From BoyWiki

"Most proxies, including TOR, will only add a few second's delay to a trace with good software."

This statement, with regards to Tor, is false. A Tor circuit cannot be traced directly in the sense that this statement implies. The weakness of Tor is that it does not provide cover traffic and as such is subject to traffic analysis, but only if the adversary can observe the traffic both at the entry node and the exit node of a circuit (perenthetically, someone with only a view from the destination server, eg, your typical server admin, does not have any information useful in "tracing" Tor circuits). So the strength of Tor is in the diversity of jurisdictions in which its servers operate, making it difficult for any one authority to compile enough information to perform traffic analysis.

If this comment cannot be backed up with a source citation, it should be removed. If there is such research providing a way to trace Tor traffic, I suggest that the Tor authors be contacted with this information, as I'm sure they would be very interested. --Belgarion 00:08, 25 September 2006 (EST)

I have also wondered about this statement; I have tried to find information on this ostensible weakness without success. Boy Talk's opinion on proxies isn't very relevant anyway. The last paragraph could be made very short and factually oriented.
Asch talk to me 02:26, 25 September 2006 (EST)

Additionally, the comment's contradictory statements "Listener Security is a primary consideration" and "Boy Talk Media do not recommend listeners rely upon proxy services to provide anonymity" show, if this is an accurate protrayal of Boy Talk Media policies, that they do not in fact understand the security of personal information. By recommending only ip vhosting, which only provides anonymity to peer users of the server, and ssl, which only provides data confidentiality between the user and their server, and disregarding an entire category of security tools, they show their ignorance in various aspects of security, privacy, and anonymity. While vhosting and ssl are a part of the security solution, users who follow their advice will not be protected if Boy Talk's computers are seized by law enforcement or if their ISP is subpenoed for records. If this sounds far-fetched, we need not look far to find an example. --Belgarion 00:08, 25 September 2006 (EST)