NSA Attacks on VPN, SSL, TLS, SSH, Tor

rysiek rysiek at hackerspace.pl
Fri Jan 9 17:13:33 PST 2015


Dnia wtorek, 30 grudnia 2014 18:46:10 Georgi Guninski pisze:
> On Tue, Dec 30, 2014 at 09:09:08AM -0600, Troy Benjegerdes wrote:
> > The US government benefits greatly from dissidents in North Korea,
> > China, Russia, Japan, and Germany being able to effectively use Tor
> > to exfiltrate business intelligence and leak it to the people that
> > run this country, the campaign contributors.
> 
> Sorry, but I don't believe this.
> 
> I agree with juan that tor has many bugs and quite likely is
>  _heavily_ backdoored, the bugs we see are probably just the top of
> the iceberg.
> 
> I suppose sufficiently many people got busted because of trusting tor
> naively.

Show us the bugs, the backdoors, the examples of busted people, eh?

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 931 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20150110/924e2c9f/attachment-0001.sig>


More information about the cypherpunks mailing list