On Sunday 04 Aug 2013 22:40:18 Matthew Toseland wrote:
> On Sunday 04 Aug 2013 18:48:15 Ian Clarke wrote:
> > I cannot vouch for the accuracy of this information, but it appears
> > plausible:
> > 
> > http://www.twitlonger.com/show/n_1rlo0uu
> 
> This one is confusing. It links to a paper claiming radical attacks on Tor, 
> without explaining why. The person who was arrested apparently has been known 
> (speculatively) to be linked with Freedom Hosting for some time; *there is no 
> evidence that the FBI broke Tor itself*, which is the key point here: There 
> is still no publicly visible evidence anywhere that any of the major open 
> source darknets have been compromised in the real world (though of course 
> there are various papers on attacks). This is an interesting fiction that the 
> authorities are maintaining, possibly to maintain intelligence options, given 
> that IMHO compromising Freenet users is well within their capabilities.
> 
> Also, it initially talks about a 0day in Firefox and then concludes that it's 
> probably not a 0day, it's just obfuscated, and it's specifically for Firefox 
> 17 - presumably they were looking for some specific individual using FF 17 
> (possibly meaning they were using Debian?)
> > 
> > Here is a report in a reputable news source, however there is no specific
> > mention of Tor:
> > 
> > http://www.independent.ie/irish-news/courts/fbi-bids-to-extradite-largest-childporn-dealer-on-planet-29469402.html
> 
> http://arstechnica.com/tech-policy/2013/08/alleged-tor-hidden-service-operator-busted-for-child-porn-distribution/
> 
> This may be a better source.
> > 
> > This could lead to a significant influx of users if it results in trust in
> > Tor hidden services being significantly damaged.  We should discuss our
> > response to it.
> 
> A few days ago I wrote a detailed but rather long piece comparing Tor to 
> Freenet. IMHO Tor provides greater anonymity today than Freenet, if you use 
> it correctly (most people don't), although it's a debatable point if you want 
> to actually run a hidden website; certainly this is much easier on Freenet, 
> although it has to be static content. Having said that I wasn't aware of the 
> paper the first link above links to when I wrote the below, but there are 
> papers about attacking Freenet too.
> https://freenetproject.org/faq.html#tor

For those quoting the above out of context: Read the whole of the linked 
article. Emphasis on "today". A (sadly so far hypothetical) global darknet 
(with PISCES tunnels) would provide very strong anonymity and be very hard to 
block.
> 
> I assume you want to write a press release / website post?

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to