[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Third-parties tracking me on Tor
Hey Cypher,
I'll keep that in mind.
Thanks
-------- Original Message --------
From: Cypher <cypher@xxxxxxxx>
Apparently from: tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx
To: tor-talk@xxxxxxxxxxxxxxxxxxxx
Subject: Re: [tor-talk] Third-parties tracking me on Tor
Date: Mon, 25 Aug 2014 17:16:28 -0500
> On 08/25/2014 05:02 PM, TerryZ@xxxxxxxxxxxxx wrote:
>
> <snip>
>
> >
> > The only thing I'm sure wasn't compromised is what I encrypted myself using my PGP key. I altered the GPG source code to create longer keys.
>
> Just a quick comment on creating a longer key. I see a lot of people
> doing that and I think it's absolutely useless. As of now, we do not
> believe that anyone has the computing power to break a 4096 bit RSA key
> by brute force. The only way would be through a side attack. If a side
> attack worked against a 4096 bit key, it would likely also work against
> a 8k key as well.
>
> There's no real benefit to creating a larger than 'standard' key at this
> point.
>
> Cypher
>
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk