"Practical onion hacking: finding the real address of Tor clients"

David Vennik davidvennik at googlemail.com
Mon Oct 23 21:49:56 UTC 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Tim McCormack wrote:
> 
> Total Privacy wrote:
>> Somebody contact his old fellow (out on a walk whit no bug mics around) saying: 
>> Howdoyoudo my friend, hear you was in some company with access to a storage of very secret certificates, huh? 
> 
> More likely is that root certificate companies are forced to hand over
> the secret keys of directory servers to the NSA. Now, that assumes that
> the directory server signatures are based on SSL root certificates -- is
> that true?
> 
>  - Tim McCormack
> 
> 

slightly ot: is my postings getting on the list and if so why is it i'm
not getting them back (perhaps my spam filter?)

- --
http://davidvennik.blogspot.com/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFPTkEgF+g21XtpK4RA5KZAKDoP6/OAusdpj7qOqg6zj465RWiKACff68Z
owQU1DORBH5+KHXp/3HE7RU=
=of0v
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: davidvennik.vcf
Type: text/x-vcard
Size: 312 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20061024/35bd259d/attachment.vcf>


More information about the tor-talk mailing list