[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Spoiled Onions
I have a basic question about the Spoiled Onions report. The bad onions
mean that someone could block traffic, could re-direct traffic, or
otherwise censor content, but they couldn't de-anonymize users nor could
they prevent user from re-connecting to Tor network with different nodes.
Do I understand the story? If so, am I correct?
On Wed, Jan 22, 2014 at 10:36 AM, Elysius <elysius@xxxxxxxxxxxx> wrote:
> The more I read about various exit node exploits, the more convinced I
> am that Tor's future is in beefing up hidden service functions and
> keeping as much traffic as possible within the Tor network.
>
> I hope that the Tor developers see this the same way. Expanding the
> usefulness of hidden services is the way for Tor to grow and be accepted.
>
> Elysius
>
> On 22/01/14 12:32 AM, ramo@xxxxxxxxxxxxxxx wrote:
> >
> http://arstechnica.com/security/2014/01/scientists-detect-spoiled-onions-trying-to-sabotage-tor-privacy-network/
>
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
--
William N. Conlow
Rutgers--Camden Law, 2013
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk