On Tue, 2011-10-11 at 17:29 +0200, Eugen Leitl wrote: > If they have to dispatch a warm body to a remote physical > location my job is done already. If it has to be a warm sentient > body who has to analyze an unfamiliar situation and attempt an > undetected physical layer attack I've already succeeded wildly > beyond all expectations. A thousand times this. People in this thread don't seem to understand the concept of quantification. The trend seems to be lots of people saying "X can be attacked, and Y can be attacked, and an attack equals an attack, so you should rend your garments in despair." They're missing that cost(X) >>> cost(Y). My cell provider has a website where, if given a valid law enforcement ID, it will yield arbitrary text messages and location data for customers. I'm certain Google, Microsoft, Yahoo, and AOL all have roughly the same interface. Which is more expensive: raiding a colo, or clicking the "Get hotmail emails" bookmark and reading?
Attachment:
signature.asc
Description: This is a digitally signed message part
_______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk