With all the talk about the N_S_A targeting traffic between exit nodes
and destination websites, I am wondering how this may work for hidden
services (.onion domains). There are no exit nodes as everything occurs
within the hidden services network.
How would it be possible for an adversary t
On 2014-06-30 22:33, Geoff Down wrote:
On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote:
But how can the person's computer be identified since all that is seen
is
the connection between the exit node and the destination
target_website.com
The point, surely, is that real time code inj
On 2014-06-29 06:22, Roger Dingledine wrote:
On Sat, Jun 28, 2014 at 09:38:05PM +, williamwin...@openmailbox.org
wrote:
I don't understand what Schneier means by this:
"After identifying an individual Tor user on the internet, the NSA
uses its network of secret internet servers to redirect
I recently read a Guardian article from last October
(www.theguardian.com/world/2013/oct/04/tor-attacks-cnsa-users-online-anonymity)
by Bruce Schneier about the N_S_A and Tor. His story was based on the
"Tor Stinks" and "Egotistical Giraffe" presentations.
My understanding of the article is th