8 Mar
2014
8 Mar
'14
5:59 a.m.
Dnia piątek, 7 marca 2014 14:31:58 John Young pisze:
"Also keep in mind that there are no confirmed on the record cases to date of a Tor 'break/weakness' having been used to find a user. It appears to be only user error."
One of the perdurable claims of comsec promoters is that comsec breaks and weaknesses inevitably turn out to be user errors. Exactly who the fictitious user is remains obscure but assuredly means somebody other than the comsec promoter user who inevitably offers a greatly improved product, trust them.
Tor is especially adept at blaming users, itself faultless except for lack of volunteers to patch its innumerable holes
Would you care to elaborate on the innumerable holes of TOR, please? -- Pozdr rysiek