{"id":190604,"date":"2017-05-02T22:40:51","date_gmt":"2017-05-03T02:40:51","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-presents-compelling-privacy-puzzle-the-national-law-review\/"},"modified":"2017-05-02T22:40:51","modified_gmt":"2017-05-03T02:40:51","slug":"tor-presents-compelling-privacy-puzzle-the-national-law-review","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-presents-compelling-privacy-puzzle-the-national-law-review\/","title":{"rendered":"Tor Presents Compelling Privacy Puzzle &#8211; The National Law Review"},"content":{"rendered":"<p><p>    Even among somewhat sophisticated privacy professionals and    lawyers, the Tor    Browser is sometimes a bit of a mystery. What is Tor, is it    even legal, and, if so, what are the pros and cons associated    with Tor? At a fundamental level, Tor is actually quite    simpleTor protects the privacy of its users by spreading    communications across of a series of servers around the world    to make it difficult to determine who or where the individual    user is. Tor is a volunteer operation and it is available to    anyone willing and able to download the free software from    Tors Web site.  <\/p>\n<p>    In some circles, using Tor has taken on a negative connotation    because (not surprisingly) individuals engaged in nefarious    activities online have turned to Tor as a way to mask their    identities. But there is nothing per se illegal about using    Tor, and it can be a legitimate way to avoid unwanted digital    tracking from corporations and circumvent censorship in    countries under the thumb of oppressive regimes. In fact, the    U.S. State Department has contributed millions of dollars over    the years to help with the development of Tor in the interest    of encouraging free speech in other countries.  <\/p>\n<p>    Of course, the U.S. government also has a strong desire to be    able to pierce through the anonymity of Tor when it suits the    governments objectives  the NSA has been battling with Tor    developers for years to gain the upper hand in cracking    anonymity, and information originally revealed by Edward    Snowden allegedly shows that an NSA surveillance program may    track anyone who has ever used Tor.  <\/p>\n<p>    So what happens when law enforcement officials with legitimate    motives  for example, pursuing child pornographers  are    stymied by this sort of technology? According to a report    earlier this week in the ABA Journal, innocent people    may be caught in the crossfire of a digital war, often with no    idea what is going on. The ABA Journal article    provides examples of police executing search warrants and    attempting to make arrests based on IP address information that    turned out to be inaccurate. In an effort to prevent these    sorts of situations, Tor has created ExoneraTor, which can    be used to see if an IP address on a certain day was used as an    exit relay. According to Tor, if you see traffic from a Tor    relay, this traffic usually originates from someone using Tor,    rather than from the relay operator. But for this to be    effective, law enforcement has to realize that lead is a dead    end  and as the ABA Journal article correctly    observes, it is unreasonable to expect police officers    nationwide to have this level of technical knowledge,    particularly when some in the privacy community are still    behind the curve.  <\/p>\n<p>    Tor can lead to a spirited debate on many different fronts, but    the one thing that seems beyond dispute is that Tor and other    tools like it are not going anywhere. It is therefore critical    that privacy lawyers and other privacy professionals develop a    strong working understanding of Tor so that they can properly    advise their clients.  <\/p>\n<p>    This is the third in a series of blog articles relating to    the topics to be discussed at the 30th Annual Media and the Law    Seminar in Kansas City, Missouri on May 4-5, 2017. Blaine C.    Kimrey and Bryan K. Clark are on the planning committee    for the conference. In this article, we discuss the Tor Browser    and its relationship to privacy laws. Tors impact on anonymous    speech and the tension between First Amendment    rights and online threats to reputation, privacy and public    safety will be among the topics discussed at    the 2017 seminar.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.natlawreview.com\/article\/tor-presents-compelling-privacy-puzzle\" title=\"Tor Presents Compelling Privacy Puzzle - The National Law Review\">Tor Presents Compelling Privacy Puzzle - The National Law Review<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Even among somewhat sophisticated privacy professionals and lawyers, the Tor Browser is sometimes a bit of a mystery. What is Tor, is it even legal, and, if so, what are the pros and cons associated with Tor?  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-presents-compelling-privacy-puzzle-the-national-law-review\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-190604","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190604"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=190604"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190604\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=190604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=190604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=190604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}