[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Third-parties tracking me on Tor



Hey Cypher,

I'll keep that in mind.


Thanks

-------- Original Message --------
From: Cypher <cypher@xxxxxxxx>
Apparently from: tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx
To: tor-talk@xxxxxxxxxxxxxxxxxxxx
Subject: Re: [tor-talk] Third-parties tracking me on Tor
Date: Mon, 25 Aug 2014 17:16:28 -0500

> On 08/25/2014 05:02 PM, TerryZ@xxxxxxxxxxxxx wrote:
> 
> <snip>
> 
> > 
> > The only thing I'm sure wasn't compromised is what I encrypted myself using my PGP key. I altered the GPG source code to create longer keys. 
> 
> Just a quick comment on creating a longer key. I see a lot of people
> doing that and I think it's absolutely useless. As of now, we do not
> believe that anyone has the computing power to break a 4096 bit RSA key
> by brute force. The only way would be through a side attack. If a side
> attack worked against a 4096 bit key, it would likely also work against
> a 8k key as well.
> 
> There's no real benefit to creating a larger than 'standard' key at this
> point.
> 
> Cypher
> 
> -- 
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk