Tails vulnerability specific to I2P, not Tor

John Young jya at pipeline.com
Thu Jul 24 07:38:34 PDT 2014


Ah, the standard CYA natsec and comsec marketing spiel used by 
nations, spies and contractors, upgades essential, 24x7x365 
monitoring recommended but SHINT happens:

At 10:04 AM 7/24/2014, you wrote:
>We publicized the fact that we've discovered these issues for a very 
>simple reason: no user should put full trust into any particular 
>security solution. By bringing to light the fact that we have found 
>verifiable flaws in such a widely trusted piece of code, we hope to 
>remind the Tails userbase that no software is infallible.





More information about the cypherpunks mailing list