[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: some small questions
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: some small questions
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Sun, 24 Feb 2008 16:17:13 -0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sun, 24 Feb 2008 19:17:24 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; bh=2m29pQMmvYFZTG4U0bmpomlbTSYURH6L7jVIKykvcyY=; b=JPWYOAa/f40ofkbnsyDPkerSp4XcMC6JAJy7STaApi81rdHfH0Tx9OJjThkzD1VDa/MQDP39Y7uJWSPr9nR/+h/VuFkr9umSPpiD15fCLF4EIbRXv2/nQ0Q5KQOLU+smg6RFKFwIB0dWwOHFWG8sf97cYyt/X+Syx68RcVsiGwc=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; b=FsqMcOGoJ9QgZ8pztG90Pxjfp/hOObwpPCACRjUWVb6ZWRqI398R9GRKPxZRS6wfJpZFgyiGuN7uhzQUMQhp7a13SVaCkvXDgHOtvzcQCvWbjF9L/KQ9Bd3Ax70m1enBbl5hdV3uRTIC8dsjq1NwuknoMADZOTeOrXKpT+Pn468=
- In-reply-to: <1203878369.8803.19.camel@localhost>
- References: <47c18b1d.2134440a.7428.78c6@xxxxxxxxxxxxx> <1203878369.8803.19.camel@localhost>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Icedove 1.5.0.14pre (X11/20080208)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Dietrich Schmidt wrote:
(snip)
> So yes, anyone, including hackers, can use tor to stay anonymously.
>
> You have to protect yourself agains hackers anyway - if they use
> tor or not.
(snip)
@ smiles @
Hackers built Tor - and pretty much everything at the heart of the
Internet. =;o)
I believe you mean "bad" or malicious hackers by your statement - the
kind that break the law and end up in the news. Such persons are often
referred to as "crackers" or "black-hats."
Just know that not all hackers are bad; in fact, the whole goal for most
hackers is creation, not destruction.
"Genesis was perfectly named: The creation of life - not death."
- - Sarek, Star Trek IV.
- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org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=YDEX
-----END PGP SIGNATURE-----