11.12.2017 2:23, Yuri wrote:

> On 12/10/17 10:15, Igor Mozolevsky wrote:
>> They are not "hypothetical characters," they are invented characters that
>> are used in a threat model. But that's reframing the problem- a
>> hypothetical threat model is very different to a real threat model.
> 
> 
> This is a very real threat model. There are a lot of malicious Tor exit node 
> operators,
> and a lot of FreeBSD users update their system over subversion. The
> only thing that the Tor node operator needs to do is to detect relevant 
> requests and serve malware.

Hmm, you should not pass your traffic through the network operated
by lots of malicious operators in first place. No matter encrypted or not.
There are plenty of alternative ways.

_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to