On Wed, May 30, 2012 at 9:07 AM, Fabio Pietrosanti (naif)
<li...@infosecurity.ch> wrote:
> So basically "on top of Tor software and Tor Infrastructure" it would be
> possible to build other kind of networks, given that they participate to
> the Tor network itself.

And the directory authorities could freely attack such usage at will.

They're trusted to document tor nodes— but why would you trust them to
publish other data?
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to