On 08/23/2013 12:41 PM, Nathan Suchy wrote: > I'd beg to differ. There are very good VPN providers that keep absolutely > no logs so you would have anonymity in that case. I think a commercial vpn > without logs is the best way to go but you could also handpick nodes (tor > needs to have a auto feature which can auto pick nodes by country. Covert > Browser for IOS allows you to pick your exit node. You're assuming that there's endpoint anonymity and that no one could correlate you connecting to Server A and a piece of traffic coming from Server A at the same time.
At a basic level, this type of correlation is responsible for Jeremy Hammond's arrest (his VPN disconnected from IRC right as he lost internet -- deniability is useless here). And any iOS device is likely keeping track of your recent server connections. If I had a week, I couldn't list all the cases where someone mislaid their trust in a service provider to protect them. Deniability is dead. What Tor provides is unlinkability. best, Griffin -- "Cypherpunks write code not flame wars." --Jurre van Bergen #Foucault / PGP: 0xAE792C97 / OTR: [email protected] My posts, while frequently amusing, are not representative of the thoughts of my employer. -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
