[tor-talk] "Safeplug"

Mike Cardwell tor at lists.grepular.com
Sat Nov 23 20:03:10 UTC 2013

* on the Fri, Nov 22, 2013 at 06:17:24PM +0000, Jacob Appelbaum wrote:

>> You shouldn't just route people through Tor without their knowledge.
>> They need to understand the risks and adapt their use accordingly.
> And what is the risk of barebacking with a network?

When your traffic comes out of a Tor exit node, there is a significantly
increased risk of passive and active MITM attacks against you, and also
increased risk of being locked out of your accounts.

> Why should I let traffic trace back to my network?
> Does that user gather my consent for every action that will be tied
> to me? No.

I did not say, "don't route people through Tor". I said, "don't route
people through Tor without their knowledge."

Mike Cardwell  https://grepular.com/     http://cardwellit.com/
OpenPGP Key    35BC AF1D 3AA2 1F84 3DC3  B0CF 70A5 F512 0018 461F
XMPP OTR Key   8924 B06A 7917 AAF3 DBB1  BF1B 295C 3C78 3EF1 46B4
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 598 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20131123/bf5723d1/attachment.sig>

More information about the tor-talk mailing list