[Cryptography] Are Tor hidden services really hidden?

rysiek rysiek at hackerspace.pl
Fri Mar 7 12:59:45 PST 2014

Dnia piÄ…tek, 7 marca 2014 14:31:58 John Young pisze:
> "Also keep in mind that there are no confirmed on the record cases to
> date of a Tor 'break/weakness' having been used to find a user. It
> appears to be only user error."
> One of the perdurable claims of comsec promoters is that comsec
> breaks and weaknesses inevitably turn out to be user errors. Exactly
> who the fictitious user is remains obscure but assuredly means
> somebody other than the comsec promoter user who inevitably
> offers a greatly improved product, trust them.
> Tor is especially adept at blaming users, itself faultless except for lack
> of volunteers to patch its innumerable holes

Would you care to elaborate on the innumerable holes of TOR, please?

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 316 bytes
Desc: This is a digitally signed message part.
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20140307/f4a1c644/attachment-0002.sig>

More information about the cypherpunks mailing list