On Fri, 27 Jun 2014 13:48:27 -0700 coderman <[email protected]> wrote:
> On Fri, Jun 27, 2014 at 11:38 AM, Juan <[email protected]> wrote: > >... > > And so we have amusing tor lackeys like ¨coderman¨ > > parroting propaganda that not even the tor developers > > themselves believe. > > this is amusing! explain to me where i've said Tor resists traffic > analysis? :) As I already mentioned, you and others talk as if that were the case. As a matter of fact you are doing it again in this (previous) message of yours. > > my point is that Tor is harder than the software you're using over it. That is just a generality, a half truth, and not relevant in this context. It is an excuse and a distraction. > web browsers, instant messaging clients, web services and poorly > implemented applications. > > why do you need traffic analysis when trivial attacks work just as > well? I dont need traffic analysis, I am not a government nazi. However, government nazis do need traffic analysis to deal with people who correctly configure their servers. It shouldnt be necessary for me to point out such obvious fact? Also, if attacks against servers are ´easy´, why did it take years for the government to get freedom hosting? > > > > > So, how did the american gestapo get freedom hosting and > > silk road? Traffic analysis. > > citation needed. all signs point to insider threat (you know, rats) Citation needed? What kind of citation? I make my case based on basic, correct reasoning and public information. And you have nothing to counter it. And what are *you* doing? Are you indeed parroting the official story? Are you that ´naive´? > all signs point to insider threat (you know, rats) So, wheres **your** evidence for that parallel story? > > > > > https://en.wikipedia.org/wiki/Parallel_construction > > we could have a long discussion on this subject, but not apropos to > this list... What? You dont want to discuss how fuckingly corrupt the US government is in a list that belongs to the US government? You dont want to discuss the fact that the american ´justice´ system is based on blatant lies and that they even have a procedure in place to manage those blatant lies? tsk tsk tsk And, au contraire, the discussion is 100% a propos this mailing list. See, you are basing your baseless defence of Tor (US military project) on lies from the US government, lies which in turn can be traced to so called ¨parallel contstruction¨. > > > best regards, > > > > TL;DR: Tor is not the weak spot in your privacy. Baseless assertion. > OPSEC, application > attack surface, pervasive information insecurity - these are all going > to betray you before some fundamental vulnerability in Tor protocol. False, baseless assertion. Notice again how you fail to specify the ´threat model´, to use your military jargon. You are not explicitly saying that tor resists traffic analysis, but you are saying something that amounts to the same thing - that traffic analysis doesnt matter. J. -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
