[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor browser can be fingerprinted
"On 9/12/13, 2:50 AM, Marthin Miller wrote:
> Hi. The main problem for what you made public as Tor software is that it
> uses 1024bit RSA keys which can be cracked in a few hours and compromise
> Tor path.
>
Can you provide proof of this?"
The articles I've been reading about the NSA breaking encryption have
suggested that 1024bit encryption may be totally compromised, or
ineffective... but proof is hard to come by.
On Wed, Sep 11, 2013 at 9:12 PM, Peter Tonoli <Peter+tor@xxxxxxxxxxxxx>wrote:
> Hi,
>
> On 9/12/13, 2:50 AM, Marthin Miller wrote:
>
>> Hi. The main problem for what you made public as Tor software is that it
>> uses 1024bit RSA keys which can be cracked in a few hours and compromise
>> Tor path.
>>
>
> Can you provide proof of this?
>
> kthxnbai
>
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/**cgi-bin/mailman/listinfo/tor-**talk<https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>
>
--
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk