[tor-talk] Tor browser can be fingerprinted

William Conlow wmconlow at gmail.com
Thu Sep 12 02:12:00 UTC 2013


"On 9/12/13, 2:50 AM, Marthin Miller wrote:

> Hi. The main problem for what you made public as Tor software is that it
> uses 1024bit RSA keys which can be cracked in a few hours and compromise
> Tor path.
>

Can you provide proof of this?"



The articles I've been reading about the NSA breaking encryption have
suggested that 1024bit encryption may be totally compromised, or
ineffective... but proof is hard to come by.




On Wed, Sep 11, 2013 at 9:12 PM, Peter Tonoli <Peter+tor at metaverse.org>wrote:

> Hi,
>
> On 9/12/13, 2:50 AM, Marthin Miller wrote:
>
>> Hi. The main problem for what you made public as Tor software is that it
>> uses 1024bit RSA keys which can be cracked in a few hours and compromise
>> Tor path.
>>
>
> Can you provide proof of this?
>
> kthxnbai
>
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/**cgi-bin/mailman/listinfo/tor-**talk<https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>
>



--


More information about the tor-talk mailing list