--- On Tue, 7/31/12, Andrew Lewman <[email protected]> wrote:

> From: Andrew Lewman <[email protected]>
> Subject: Re: [tor-talk] Free WiFi Bootable Ditros
> To: [email protected]
> Date: Tuesday, July 31, 2012, 11:31 AM
> On Mon, 30 Jul 2012 10:57:24 -0700
> (PDT)
> jed c <[email protected]>
> wrote:
> 
> > I wouldn't recommend TOR for anything personally
> identifying
> > (anything done on TOR has a chance of greater scrutiny
> and malicious
> > subversion). 
> 
> Have you data to empirically show this is true?

I have only my own personal experience. Certainly TOR would be targeted to some 
degree. The chat exploit was interesting and I suspect I unintentionally 
mentioned a keyword that is being watched. The way the text got moved around 
makes me suspect that some control ASCII characters were being used to navigate 
through all previous chats with this particular individual. The browser on my 
friend's end recovered eventually. It's possible (I have no way of proving) 
that my friend's unencrypted connection was the one targeted. But the question 
remains why. I suspect the attack was due to both using TOR and using an 
innocuous word that is a word used to describe something connected to TOR. 
> 
> I run the Tor organization over Tor in order to eat our own
> dog food[0].
> So far it's been dog food and not drinking kool aid. 
> I'm fully aware
> of Tor's failings and frustrations in using it 7x24.
> 
> [0] https://en.wikipedia.org/wiki/Eating_your_own_dog_food
> [1] https://en.wikipedia.org/wiki/Drinking_the_Kool-Aid
> 
> -- 
> Andrew
> http://tpo.is/contact
> pgp 0x6B4D6475
> _______________________________________________
> tor-talk mailing list
> [email protected]
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
_______________________________________________
tor-talk mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to