Tails vulnerability specific to I2P, not Tor
John Young
jya at pipeline.com
Thu Jul 24 07:38:34 PDT 2014
Ah, the standard CYA natsec and comsec marketing spiel used by
nations, spies and contractors, upgades essential, 24x7x365
monitoring recommended but SHINT happens:
At 10:04 AM 7/24/2014, you wrote:
>We publicized the fact that we've discovered these issues for a very
>simple reason: no user should put full trust into any particular
>security solution. By bringing to light the fact that we have found
>verifiable flaws in such a widely trusted piece of code, we hope to
>remind the Tails userbase that no software is infallible.
More information about the cypherpunks
mailing list