Re: Feasibility of Using TOR or VPNs For Anonymity
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 In reply to John: So you say all hope is lost, then? That Nineteen Eighty-Four has come upon us? Don't tell me you give up a white flag so easily. If a system has been build, it can be broken. Then lets look to mitigation and obfuscation. What is the lesser of two evils? I have been suspicious of TOR long enough to stop using it. But the technology of VPNs don't seem to be the failing point, it's its operators. What of compromised servers? Installing a network of VPNs or a darknet on a host of unsuspecting machines, thus leaving them exposed to the world whilst I comfortably stay obfuscated? Perhaps a more blackhat approach is the way to go. I'm only briefly aware of HBGary and others, but from what I've heard that is the exact reason why I'd prefer to operate under a pseudonym and not my real identity. Perhaps some faith should be placed in the design of the P2P DNS infrastructure? One that could, hopefully, provide a safer haven that traditional DNS and Internet structure. -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJNZDXsAAoJEPuu2mBeOIXHz+cQAJQ9P5JSSocc4o9KKwVGoTDM zKywxriWvE/sJp72kpPPQmrQI5D35qIgO0GYgphU/cTtfUSwX/V0UPu09iaBpgVB MAX9x1uf+3n5aTo5R97OJD9+5ymg/8tqj+26qwuY3ChOoAoNbmFgQRqAu3/3f95Y Ma95GpM5jglpnOgVIy9rmnUBJlEuG0aDX5Kce5S0XSXIu+S4vEH/IoCtpyTV4oY/ ZYok2fCtbFm6Bb4kgbkVG0RnzjcAdqVOg54MetK5StLpeF/2vzUFVORRJqGZkTQ7 ympTmKpQazpqtPHDzYOCjDOAZQA2BV5EObySAAOzTcIbRvs5VV0+hDa+ai+pboOo YpiZ+9Ki9bMu0ZW39Yln5NtQB3JWQx1VyaaI/nOoG4+cy8GZCkOB3u370DOy6JiJ 1fdTxGOklxq8gmH/Qj/TBpi4Lg8oTWDasxEf+YQLifcbLjdJ7DEU08SR+h5BuMBB BPMTuNuLlYx0EtV6tjn/BzuobuFCy57jInNaC5Cddqb2T14nzrYuauVGG2CFLbms hcXgdqAyIiK2fAdcJY3dugq8K0A4u2espVl5OLTZ4Tb4Dk+HKVw6vJAUm45GOhQn WuqgnPC966Vwe1jPbiq8w/lXkdiWLwfDQc8oyU3n/038FGt3xNB/AAbBJ8kU7nLk OeB4HwoIFWxmfMQmF/np =6eaf -----END PGP SIGNATURE-----
participants (1)
-
m0lt1