[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Building a new Tor that can resist next-generation state surveillance
- Subject: Building a new Tor that can resist next-generation state surveillance
- From: schear.steve at gmail.com (Steven Schear)
- Date: Sat, 18 Feb 2017 21:46:44 -0800
- In-reply-to: <[email protected]>
- References: <CAD2Ti2-GosBLqsR-NC-frcG+X68h+3AW9JuNm+oesJRQ=xn44Q@mail.gmail.com> <CAD2Ti2-n2x+F_DU5B_Lb_a8UpUbkf1ti7gh2eycm=pRKzDtE2w@mail.gmail.com> <[email protected]>
If you must use tor its best to combine it with a good, multi-hop, VPN. I
prefer i2p (there's now a fully C++ version for those who don't trust Java)
and cjdns.
On Fri, Feb 17, 2017 at 12:42 AM, Eugen Leitl <eugen at leitl.org> wrote:
> On Fri, Feb 17, 2017 at 12:45:50AM -0500, grarpamp wrote:
> > https://arstechnica.com/security/2016/08/building-a-
> new-tor-that-withstands-next-generation-state-surveillance/
> >
> > Forgot to put the link above.
>
> Anyone here able to evaluate the merits of the proposed new architectures?
> Or do we have to wait for the proof after pudding is served?
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1111 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20170218/9cb915a1/attachment.txt>