Tor is not secure.  Neither is genode. If You wan't security disconnect all 
devices from network, only usw them in rooms without windows.

If You habe enough nodes you Can easily deanomize users. This was done most 
part of last year as the Tor team announced that nodes where removed. Also you 
cannot say if other nodes are contaminated. 

In genode you can use the fact that there are a dort of shared components to 
send messages between programs without really having any token for a 
communication between them.

Tor could just be another software to create an additional security hole.

Where there is a software there are bugs, workarounds etc.pp.



----- Ursprüngliche Nachricht -----
Von: "Nobody III" <hungryninja...@gmail.com>
Gesendet: ‎15.‎06.‎2015 00:41
An: "Genode OS Framework Mailing List" <genode-main@lists.sourceforge.net>
Betreff: Genode Tails?

Tor, an anonymity network, is used to get around NSA spying and the like.
Unfortunately, The NSA has been using a workaround: hack the computers that
try using Tor by exploiting vulnerabilities in Tor Browser, a slightly
modified version of Firefox. Tails is a Linux distribution that uses Tor
for all its network communications. It seems like Genode would be
better-suited for protecting anonymity than Tails. A Tails equivalent seems
like a very useful, relatively simple yet incredibly practical use of
Genode. Anyone else want to pursue this? Also, how secure is the current
Arora browser on Genode?
------------------------------------------------------------------------------
_______________________________________________
genode-main mailing list
genode-main@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/genode-main

Reply via email to