[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Exit MITMing plausible?



Hi all,

a short question regarding potential state-rogue
exit nodes: Does tor browser pin the certificates
(even/at least in-session) so one could detect when
the certificate offered changes to to a bad exit
which does MITM? (Obviously restricted to
state actors.)

Besides, what/how many big exits aren't operated by
known entities?

Tails obviously can't store across sessions,
and doing do in tor browser would leave
traces of accessed sites on disk. Hmm.

Andreas

-- 
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk