On 9/11/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > ... > Hmm, it looks like ToR is not so secure after all as a bunch of governmental > users just found out.
the exit node sniffing isn't a problem with Tor but user carelessness / ineptitude. web2.0 and wireless are just as guilty. [0] as for the vulnerability reports, only one moderately critical vulnerability across the 0.1.1.x and 0.1.2.x life times is not bad at all. particularly when you consider the control port issues was patched, binaries built, and announcement delivered in _hours_, not days, weeks, or months as is common. best regards, 0. "World's biggest websites no match for decade-old web bug" http://www.theregister.com/2007/09/08/security_group_warns_of_web_vulnerabity/ _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
