On 9/11/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> ...
> Hmm, it looks like ToR is not so secure after all as a bunch of governmental
> users just found out.

the exit node sniffing isn't a problem with Tor but user carelessness
/ ineptitude.  web2.0 and wireless are just as guilty. [0]

as for the vulnerability reports, only one moderately critical
vulnerability across the 0.1.1.x and 0.1.2.x life times is not bad at
all.  particularly when you consider the control port issues was
patched, binaries built, and announcement delivered in _hours_, not
days, weeks, or months as is common.

best regards,


0. "World's biggest websites no match for decade-old web bug"
 http://www.theregister.com/2007/09/08/security_group_warns_of_web_vulnerabity/
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to