Bitcoin Forum
May 27, 2024, 01:13:47 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: CryptoSeal VPN shuts down rather than risk NSA demands for crypto keys  (Read 1380 times)
pedrog
Legendary
*
Offline Offline

Activity: 2786
Merit: 1031



View Profile
October 23, 2013, 05:08:19 PM
 #21

as far as I can see, there is literally no way of getting around this issue except by onion routing.  Undecided

This is sure to drive even more users to TOR, not sure if that's a good thing or a bad thing in the long run.
Do you really think the NSA can't trace TOR? Something like 60% of TORs development money came from the US Govt.

Enlighten me: How exactly do they get thru onion routing?

The answer: They can't.

There is a huge difference between legitimate parts of the government and illegitimate parts.

They can "deanonymize" some users, they just need to control enough nodes.

At best, its just a random thing. You basically need to set up a lot of nodes and just hope that the target user relays thru them.

If you're concerned about stuff like this, the best thing you can do is, guess what, set up your computer as a relay.

Yes, they admitted they are unable to de-anonymize all users.

http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document

Spendulus
Legendary
*
Offline Offline

Activity: 2898
Merit: 1386



View Profile
October 23, 2013, 06:08:48 PM
 #22

as far as I can see, there is literally no way of getting around this issue except by onion routing.  Undecided

This is sure to drive even more users to TOR, not sure if that's a good thing or a bad thing in the long run.
Do you really think the NSA can't trace TOR? Something like 60% of TORs development money came from the US Govt.

Enlighten me: How exactly do they get thru onion routing?

The answer: They can't.

There is a huge difference between legitimate parts of the government and illegitimate parts.

They can "deanonymize" some users, they just need to control enough nodes.

At best, its just a random thing. You basically need to set up a lot of nodes and just hope that the target user relays thru them.

If you're concerned about stuff like this, the best thing you can do is, guess what, set up your computer as a relay.

Yes, they admitted they are unable to de-anonymize all users.

http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
That's not what they said.  Basically they said they could only identify a few (a few percent).
pedrog
Legendary
*
Offline Offline

Activity: 2786
Merit: 1031



View Profile
October 23, 2013, 09:07:04 PM
 #23

That's not what they said.  Basically they said they could only identify a few (a few percent).

Are we talking in different languages?


Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!