NSA Attacks on VPN, SSL, TLS, SSH, Tor

rysiek rysiek at hackerspace.pl
Wed Jan 14 06:19:21 PST 2015


Dnia środa, 14 stycznia 2015 01:39:42 L pisze:
> On Sat, Jan 10, 2015 at 02:13:33AM +0100, rysiek wrote:
> > Dnia wtorek, 30 grudnia 2014 18:46:10 Georgi Guninski pisze:
> > > On Tue, Dec 30, 2014 at 09:09:08AM -0600, Troy Benjegerdes wrote:
> > > > The US government benefits greatly from dissidents in North Korea,
> > > > China, Russia, Japan, and Germany being able to effectively use Tor
> > > > to exfiltrate business intelligence and leak it to the people that
> > > > run this country, the campaign contributors.
> > > 
> > > Sorry, but I don't believe this.
> > > 
> > > I agree with juan that tor has many bugs and quite likely is
> > > 
> > >  _heavily_ backdoored, the bugs we see are probably just the top of
> > > 
> > > the iceberg.
> > > 
> > > I suppose sufficiently many people got busted because of trusting tor
> > > naively.
> > 
> > Show us the bugs, the backdoors, the examples of busted people, eh?
> 
> Well, I for one, have been busted real hard. They call it PITA.

Great. Can we try to locate and identify the backdoor? The code is open, so it 
*should* be possible, right?

inb4 trusting trust, use your own compiler or something ;)

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 931 bytes
Desc: This is a digitally signed message part.
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20150114/8c668ec6/attachment-0002.sig>


More information about the cypherpunks mailing list