Historical analogy on Tor network. ++ Connection closed by remote ghost.
----- Original Message ----- > From: "Bezdomny" <[email protected]> > To: "NetBehaviour for networked distributed creativity" > <[email protected]> > Sent: Friday, 4 October, 2013 6:47:04 AM > Subject: Re: [NetBehaviour] FW: Blogpost: "Snowden isn't just about > Surveillance. It is much, Much, MUCH worse... > La Cosa Nostra has distributed commands anonymously for over a century using > little slips of paper delivered hand-to-hand via innumerable intermediaries. > On Oct 3, 2013 6:34 PM, "michael gurstein" < [email protected] > wrote: > > Precisely what "fiddling" they are actually doing (apart from the > > enormously > > > revealing Stuxnet) isn't clear (yet?), but that they are in principle able > > > to do pretty much anything they want in intervening in the bitstream is I > > > think quite evident. My guess would be that a lot of various types of > > > intervention is still quite labour intensive but I would be very surprised > > > if they weren't working on useable tools. > > > M >
_______________________________________________ NetBehaviour mailing list [email protected] http://www.netbehaviour.org/mailman/listinfo/netbehaviour
