"On 9/12/13, 2:50 AM, Marthin Miller wrote: > Hi. The main problem for what you made public as Tor software is that it > uses 1024bit RSA keys which can be cracked in a few hours and compromise > Tor path. >
Can you provide proof of this?" The articles I've been reading about the NSA breaking encryption have suggested that 1024bit encryption may be totally compromised, or ineffective... but proof is hard to come by. On Wed, Sep 11, 2013 at 9:12 PM, Peter Tonoli <[email protected]>wrote: > Hi, > > On 9/12/13, 2:50 AM, Marthin Miller wrote: > >> Hi. The main problem for what you made public as Tor software is that it >> uses 1024bit RSA keys which can be cracked in a few hours and compromise >> Tor path. >> > > Can you provide proof of this? > > kthxnbai > > -- > tor-talk mailing list - [email protected] > To unsusbscribe or change other settings go to > https://lists.torproject.org/**cgi-bin/mailman/listinfo/tor-**talk<https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk> > -- -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
