Dnia piÄ…tek, 7 marca 2014 14:31:58 John Young pisze: > "Also keep in mind that there are no confirmed on the record cases to > date of a Tor 'break/weakness' having been used to find a user. It > appears to be only user error." > > One of the perdurable claims of comsec promoters is that comsec > breaks and weaknesses inevitably turn out to be user errors. Exactly > who the fictitious user is remains obscure but assuredly means > somebody other than the comsec promoter user who inevitably > offers a greatly improved product, trust them. > > Tor is especially adept at blaming users, itself faultless except for lack > of volunteers to patch its innumerable holes
Would you care to elaborate on the innumerable holes of TOR, please? -- Pozdr rysiek
signature.asc
Description: This is a digitally signed message part.
