Re: [cryptography] To Tor or not to Tor?

2014-03-26 Thread John Young
Ubiquitous use of a comsec system is a vulnerability, whether PGP or Tor or another popular means. Crypto advocates and Tor encourage widespread use as a defense but may be luring victims into traps. The more users of a system the more likely it will be attacked by officials or by malefactors.

Re: [cryptography] To Tor or not to Tor?

2014-03-26 Thread coderman
On Wed, Mar 26, 2014 at 4:23 AM, John Young j...@pipeline.com wrote: Ubiquitous use of a comsec system is a vulnerability, whether PGP or Tor or another popular means. Ubiquitous trust in technology without assurances nor fail-safes is a vulnerability - fixed that for you JYA plenty of

[cryptography] Michael Haydon on the NSA spying -- blackberries

2014-03-26 Thread ianG
http://www.spiegel.de/international/world/spiegel-interview-with-former-nsa-director-michael-hayden-a-960389-druck.html In 2008, when President Obama was elected, he had a BlackBerry. We thought, oh God, get rid of it. He said, No, I am going to keep it. So we did some stuff to it to make it a