[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
following on from today's discussion
This has been an interesting discussion (a bit of intemperate speech is always
entertaining too).
That aside, I think it has highlighted a security risk that Tor itself may be
guilty of understating to new users, namely that using Tor exposes your
traffic to a much higher likelihood of being eavesdropped than normal.
For example, I am not a network admin by day so I do not have access to public
internet traffic through legal means. Yet I am running a Tor exit server, so
I can now legally (though unethically) listen to your internet traffic and
harvest any passwords that go by.
I do not think the gravity of this trade-off by the tor user (security for
anonymity) is adequately represented.
Now that I see it for what it is, I am definitely going to introduce some sort
of nag/warning to TorK so that the user is warned at least once that using
plaintext protocols carrying authentication information on Tor carries a
serious health warning.
Am I overstating the case? Do others think that the nature of the compromise
tor users make is transparent to them?
--
KlamAV - An Anti-Virus Manager for KDE - http://www.klamav.net
TorK - A Tor Controller For KDE - http://tork.sf.net