[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Cryptography] Are Tor hidden services really hidden?
- To: [email protected]
- Subject: [Cryptography] Are Tor hidden services really hidden?
- From: [email protected] (rysiek)
- Date: Fri, 07 Mar 2014 21:59:45 +0100
- In-reply-to: <[email protected]>
- References: <CAMm+LwhGPw7=1nyWr=7kGbTyvzcFE1k58JQr=bizLxcvahtyGQ@mail.gmail.com> <CAD2Ti2-HW=FZsN3YT5q8_pjay_aVuGAKBvvyz3Xu8uKbqP30Dg@mail.gmail.com> <[email protected]>
Dnia piÄ?tek, 7 marca 2014 14:31:58 John Young pisze:
> "Also keep in mind that there are no confirmed on the record cases to
> date of a Tor 'break/weakness' having been used to find a user. It
> appears to be only user error."
>
> One of the perdurable claims of comsec promoters is that comsec
> breaks and weaknesses inevitably turn out to be user errors. Exactly
> who the fictitious user is remains obscure but assuredly means
> somebody other than the comsec promoter user who inevitably
> offers a greatly improved product, trust them.
>
> Tor is especially adept at blaming users, itself faultless except for lack
> of volunteers to patch its innumerable holes
Would you care to elaborate on the innumerable holes of TOR, please?
--
Pozdr
rysiek
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 316 bytes
Desc: This is a digitally signed message part.
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20140307/f4a1c644/attachment.sig>