[tor-relays] TAO on tor ops

Christopher Sheats yawnbox at gmail.com
Fri Jul 4 02:10:38 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

On 07/03/2014 02:13 PM, obx at riseup.net wrote:
> Do we have to assume to get targeted by TAO?
> Should we dump hardware ordered online?
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I think that this is a valid risk to look into. Given the
history/information in the Snowden docs, I assume that it is not
possible / costs too much to perform active, local surveillance on even
a majority of Tor relays. I also have doubts that local surveillance on
relays is at all beneficial. However, I think there is greater risk for
exit routers, particularly ones that routinely receive the guard flag.

Looking forward to further discussion.

- -- 
Christopher Sheats
yawnbox at gmail.com
GnuPG: 8397 7B9F D8BA 3EE5 71EF FDF3 C761 02B0 A531 D73D
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=VF2E
-----END PGP SIGNATURE-----



More information about the tor-relays mailing list