[Freedombox-discuss] Dumb idea: Alternative to Tor that promotes good behavior

Daniel Kahn Gillmor dkg at fifthhorseman.net
Sun Oct 27 22:42:03 UTC 2013


On 10/27/2013 01:26 PM, Bill Cox wrote:
> Here's the problem: Tor has little public support, because most Tor
> traffic is wasted on supporting bad behavior.

I don't think that's the main reason Tor has little public support.  I 
think Tor has little public support because using Tor is slower and less 
convenient than not using Tor, and people (at least in the USA) seem to 
value convenience above most other things.

> Here's my solution: Build a Tor-like network for routing anonymous data,
> but track behavior of all users' secret identities, and make their
> Internet history public.  Allow node operators to choose categories of
> public identities they which to support.

This would not be anonymous data.  You're asking people to publish their 
full internet histories for the privilege of being able to use the 
network.  Are you aware of the work being done toward de-anonymization 
of rich data sets?  I think many people's web browsing habits alone 
would be sufficient to discover their physical identity with relatively 
high certainty.  Even if we were to assume that the data was not 
possible to tie back to someone's physical location to put them in 
harm's way, if their network use patterns are how they do their 
activism, then publishing their network use patterns provides an 
adversary with a lot of information that is very helpful to disrupt this 
same activity (e.g. "Which web sites do they usually use to distribute 
their [tools|analysis|incitements]?  Which chat channels do they 
frequent?  Where/how do they get their e-mail?  Can we destroy or 
subvert those services?)

> For example, I would choose to promote all forms of non-violent free
> speech.  I should be able to contribute my bandwidth to this purpose.
> If a dissident in China goes by the public ID of ChinaCat, and has a
> high reputation for promoting freedom, they are welcome to use my
> bandwidth.  If someone just wants access to redtube.com, they can get
> that access from someone else.

If you prefer this, then you should personally make arrangements with 
ChinaCat directly.  I'm not convinced that you could ever make such an 
arrangement scale cleanly without gross oversimplifications that 
wouldn't meet many people's assumptions about what the terms mean.  Is a 
sit-in at a restaurant "non-violent free speech"?  What about a work 
stoppage at a factory?  how about when the workers barricade the factory 
against its owners?  What about people who sabotage or destroy machinery 
in their factory?  What about destruction of machinery that is prepared 
to destroy desparately needed housing stock?  What about people who 
smash the windows of low-wage corporate franchises?  What about smashing 
the windows and doors of fire-prone sweatshops?  Are all of these things 
non-violent free speech?  can you imagine that someone else might have a 
different answer for any of them than you do?

> There are various technical aspects to this idea.  For example, would
> prefer that the social graph between secret identities be public so I
> can use a simple network flow algorithm over trust edges between
> identities to determine how much I trust someone.

I think it would be worthwhile to spec out such an algorithm, and then 
think through the spec under a handful of real-world use cases.  what 
does it mean to do "network flow over trust edges"?  What specifically 
does "trust" mean in this context?  Can you give an example of how that 
would let you automatically determine how much you trust someone?  What 
does that kind of automated trust discovery mean from a human 
perspective?  What are the ways it could be exploited by an adversary 
intent on causing trouble?

sorry to be a pessimist, but i'm not convinced this is an effective or 
even desirable framework.

	--dkg




More information about the Freedombox-discuss mailing list