On Fri, Oct 04, 2013 at 02:05:23PM -0700, d.nix wrote:
Just published by Bart Gellman (Thanks Bart!):
http://apps.washingtonpost.com/g/page/world/nsa-research-report-on-the-tor-encryption-program/501/
This is the output of a student Summer Program project, as advertised
here:
On Oct 5, 2013, at 12:17 AM, Andy Isaacson a...@hexapodia.org wrote:
I wonder if tor.eff.org has any referer logs from 2006 showing inbound
traffic from http://wiki.gchq/ or similar.
.gchq isn't an Internet TLD, so
That's doubtful.
-j
--
Liberationtech is public archives are searchable on
On 05/10/13 16:31, John Adams wrote:
On Oct 5, 2013, at 12:17 AM, Andy Isaacson a...@hexapodia.org wrote:
I wonder if tor.eff.org has any referer logs from 2006 showing inbound
traffic from http://wiki.gchq/ or similar.
.gchq isn't an Internet TLD, so
That's doubtful.
-j
Ah, point taken. Referrer leak would be very interesting to research here.
-j
On Sat, Oct 5, 2013 at 1:25 PM, Andy Isaacson a...@hexapodia.org wrote:
On Sat, Oct 05, 2013 at 04:36:27PM +0100, Ximin Luo wrote:
On 05/10/13 16:31, John Adams wrote:
On Oct 5, 2013, at 12:17 AM, Andy
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Just published by Bart Gellman (Thanks Bart!):
http://apps.washingtonpost.com/g/page/world/nsa-research-report-on-the-tor-encryption-program/501/
- --
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (MingW32)
On Fri, Oct 04, 2013 at 02:05:23PM -0700, d.nix wrote:
Just published by Bart Gellman (Thanks Bart!):
http://apps.washingtonpost.com/g/page/world/nsa-research-report-on-the-tor-encryption-program/501/
And when you're done reading it, read the better, newer version of their
mjolnir attack: