Raw Thought

by Aaron Swartz

In Defense of Anonymity

In 1787, when America’s framers wanted to argue for its Constitution, they published their arguments (the Federalist Papers) anonymously. Whistleblowers have released everything from the Pentagon Papers to the Downing Street Memos. Anonymous speech is a First Amendment right.

And yet, on the supposedly Wild West frontier of the Internet, publishing anonymously is not so easy. Hosting providers require a name and credit card, which they have to hand over to the FBi at the drop of a National Security Letter. Free hosting sites zealously obey takedown requests and require publishers to reveal their identity if they want their stuff put back up (a tactic Scientologists have used). Luckily there are now services like Wikileaks, but they only publish a very narrow range of content.

But, talking with Virgil Griffith and others, I hit upon a new way of allowing for anonymous publishing. The amazing Tor project lets you use the Internet anonymously, by disguising your traffic thru a long series of relays. Less well-known is that it also allows for anonymous publishing, by running the system in reverse. Unfortunately, you need the Tor software to visit anonymously-published sites, but we realized there’s no reason this need be so.

So I dusted off some work I’d begun years and years ago and build a tor2web proxy. Now anyone with a web browser can visit an anonymous Tor URL like http://sexy36iscapohm7b.onion/ from any Web browser, without any special software, just by going to:

http://sexy36iscapohm7b.tor.theinfo.org/

Which means that publishing an anonymous website is now also fairly easy. (There are instructions on the Tor site — just replace the .onion when you hand out the URL. If that’s too tricky, you could use an existing provider like Freedom Hosting.)

tor2web proxies act like any other sort of proxy or router; they just route traffic from a client to a server and don’t get involved themselves, so they can’t be held legally responsible for the content that passes thru them. But to prevent against a single point of failure, I’m asking others to set up tor2web nodes to distribute the load. The next step, of course, is to support mirroring so that people can still find interesting files, even if one hidden server goes down.

Here’s to anonymity — and more tools protecting it.

You should follow me on twitter here.

October 24, 2008

Comments

There’s also still Freenet (http://freenetproject.org) ; running proxies to it might also be interesting.

posted by PJ on October 25, 2008 #

I believe a number of Tor nodes are on the Wikipedia ban list; thats the problem with these anonymous tools.

Something else which infuriates me is when message boards insist I give a valid email address. I understand this is to prevent spammers from using bots to sign up, but surely that’s the point of using captcha’s in the registration process? This sort of behaviour happens most often when a piece of hardware/software stops working and I start Googling for answers only to find that I can’t contribute to a thread unless I’ve registered! And most of the time I only want to make one or two posts, often to tell people what I’ve discovered!

posted by N on October 26, 2008 #

You can also send comments by email.

Name
Site
Email (only used for direct replies)
Comments may be edited for length and content.

Powered by theinfo.org.