[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Escape NSA just to enter commercial surveillance?
On Thu, 14 Jan 2016 14:25:20 +0000, juan wrote:
...
> Of course. It's absurd. There's nothing hidden about
> facebook's location so a 'hidden' service is...nonsense.
You're attacking the name instead of the content.
Accessing facebook via the onion service means that you
know you're talking to facebook directly; using facebooks
via either tor or directly exposes you to the risk of
being MITM'd, including faked SSL certs.
Even if the NSA is capable of brute forcing the onion key
facebook itself could build a canary by trying to access
its own onion service. If the connection ending back up
with them has strange properties they know something
is wrong.
...
> > NSA would immediately command Facebook to offer the related user
> > identification.
>
> ...assuming facebook isn't already fowarding relevant data in
> real time, all of the time...
Facebook doesn't necessarily have identifying information on
their users.
Andreas
--
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk