[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] TOR bundle on hostile platforms: why?



I don't need to cite references, and I don't need to provide proof.
I am not judging Microsoft here, but pointing out a security risk factor.
TOR Projects spent so much time analyzing detected and imagined
attack patterns and defending against them, DNS resolution being a great
example. And all this work that went into repelling a sophisticated attacker
is really paying off right now.

What I am talking about is a trivial attack, technically trivial. The feds
(at least in US and in Russia) have a complete list of unpatched Windows
vulnerabilities. They also have crackers on staff. It is, therefore,
trivial for them to survey Windows machines. It doesn't matter anymore
whether they are actually doing so (they do). What matters is that they
can do so trivially. And users need to be made secure from this very
plausible attack.

On 08/07/2013 04:53 PM, Antispam 06 wrote:
> On 07.08.2013 21:06, Ivan Zaigralin wrote:
>> It doesn't, since Microsoft can survey all outgoing and incoming
>> traffic in plain text.
> 
> References please.
> 

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk