I don't need to cite references, and I don't need to provide proof. I am not judging Microsoft here, but pointing out a security risk factor. TOR Projects spent so much time analyzing detected and imagined attack patterns and defending against them, DNS resolution being a great example. And all this work that went into repelling a sophisticated attacker is really paying off right now. What I am talking about is a trivial attack, technically trivial. The feds (at least in US and in Russia) have a complete list of unpatched Windows vulnerabilities. They also have crackers on staff. It is, therefore, trivial for them to survey Windows machines. It doesn't matter anymore whether they are actually doing so (they do). What matters is that they can do so trivially. And users need to be made secure from this very plausible attack. On 08/07/2013 04:53 PM, Antispam 06 wrote: > On 07.08.2013 21:06, Ivan Zaigralin wrote: >> It doesn't, since Microsoft can survey all outgoing and incoming >> traffic in plain text. > > References please. >
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk