[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Free WiFi Bootable Ditros
--- On Tue, 7/31/12, Andrew Lewman <andrew@xxxxxxxxxxxxx> wrote:
> From: Andrew Lewman <andrew@xxxxxxxxxxxxx>
> Subject: Re: [tor-talk] Free WiFi Bootable Ditros
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Date: Tuesday, July 31, 2012, 11:31 AM
> On Mon, 30 Jul 2012 10:57:24 -0700
> jed c <n_o_t_here@xxxxxxxxx>
> > I wouldn't recommend TOR for anything personally
> > (anything done on TOR has a chance of greater scrutiny
> and malicious
> > subversion).
> Have you data to empirically show this is true?
I have only my own personal experience. Certainly TOR would be targeted to some degree. The chat exploit was interesting and I suspect I unintentionally mentioned a keyword that is being watched. The way the text got moved around makes me suspect that some control ASCII characters were being used to navigate through all previous chats with this particular individual. The browser on my friend's end recovered eventually. It's possible (I have no way of proving) that my friend's unencrypted connection was the one targeted. But the question remains why. I suspect the attack was due to both using TOR and using an innocuous word that is a word used to describe something connected to TOR.
> I run the Tor organization over Tor in order to eat our own
> dog food.
> So far it's been dog food and not drinking kool aid.
> I'm fully aware
> of Tor's failings and frustrations in using it 7x24.
>  https://en.wikipedia.org/wiki/Eating_your_own_dog_food
>  https://en.wikipedia.org/wiki/Drinking_the_Kool-Aid
> pgp 0x6B4D6475
> tor-talk mailing list
tor-talk mailing list