[tor-talk] Free WiFi Bootable Ditros

jed c n_o_t_here at yahoo.com
Tue Jul 31 21:31:13 UTC 2012



--- On Tue, 7/31/12, Andrew Lewman <andrew at torproject.is> wrote:

> From: Andrew Lewman <andrew at torproject.is>
> Subject: Re: [tor-talk] Free WiFi Bootable Ditros
> To: tor-talk at lists.torproject.org
> Date: Tuesday, July 31, 2012, 11:31 AM
> On Mon, 30 Jul 2012 10:57:24 -0700
> (PDT)
> jed c <n_o_t_here at yahoo.com>
> wrote:
> 
> > I wouldn't recommend TOR for anything personally
> identifying
> > (anything done on TOR has a chance of greater scrutiny
> and malicious
> > subversion). 
> 
> Have you data to empirically show this is true?

I have only my own personal experience. Certainly TOR would be targeted to some degree. The chat exploit was interesting and I suspect I unintentionally mentioned a keyword that is being watched. The way the text got moved around makes me suspect that some control ASCII characters were being used to navigate through all previous chats with this particular individual. The browser on my friend's end recovered eventually. It's possible (I have no way of proving) that my friend's unencrypted connection was the one targeted. But the question remains why. I suspect the attack was due to both using TOR and using an innocuous word that is a word used to describe something connected to TOR. 
> 
> I run the Tor organization over Tor in order to eat our own
> dog food[0].
> So far it's been dog food and not drinking kool aid. 
> I'm fully aware
> of Tor's failings and frustrations in using it 7x24.
> 
> [0] https://en.wikipedia.org/wiki/Eating_your_own_dog_food
> [1] https://en.wikipedia.org/wiki/Drinking_the_Kool-Aid
> 
> -- 
> Andrew
> http://tpo.is/contact
> pgp 0x6B4D6475
> _______________________________________________
> tor-talk mailing list
> tor-talk at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 


More information about the tor-talk mailing list