On 9/13/07, Suresh Ramasubramanian wrote:
> Anish Mohammed wrote:
>
> > hop from your to be malicious. As routing schemes seem to be random, I
> > would have assumed, the system could tolerate a level of malicious nature.
>
> And it would be an entirely wrong assumption, especially given the
> comparatively limited number of TOR nodes.  Even more so if there is some
> logic built into TOR traffic to choose the nearest node, network wise, to
> propagate traffic.
>

not just that, a malicious really doesnt need to decrypt or read the
information... in some countries (and there are many of these around)
merely using TOR would probably put
you behind bars... or send the state polic banging down your door.

there are plenty of states (and not the wealthy ones) investing in hi
tech electronic traffic
monitoring equipment and software. have seen quite a few govt. tenders
from various
african states requesting quotations for all sorts of telephony and
electronic monitoring equipment.

i am sure the chinese and the american military have a strong presence
on TOR... (one
or the other of whom in most cases are working complicitly with some
form of despotic
regime..)

Reply via email to