[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor at heart of embassy passwords leak; "ToR isn’t the problem, just use it for what it’s made for."

		On Sep 10 2007, coderman wrote:
| the main difference is that your ISP (unless it is a wireless one)
| will rarely expose you to active man in the middle attacks.  this does
| make certain types of attacks possible that cannot be implemented in a
| fully passive manner.

This argument is flawed insofar as when you are using Tor, it is in
effect one of your ISPs. The correct comparison here would be that, just
like your ISP can implement man in the middle attacks against you, so
too, can a Tor operator.