--- On Thu, 6/2/11, [email protected] <[email protected]> wrote: > "If Tor has vulnerabilities, it might get exploited!" > > Of course, you can replace "Tor" with any other application > name. Tor is not special in this regard.
It is a server though, and every other application is not. Most home user's are not used to running and securing servers. While I may not have taken the approach (or tone) the original post did, I do think that his concern should be taken more seriously and not trivialised falsely, -Martin _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
