Hi,

[dropping Patrick from Cc, as he obviously reads tails-dev@.]

Patrick Schleizer wrote (15 Aug 2014 21:17:17 GMT) :
> Let's think again of examples where this might happen. And then
> determine with which strategy users would be better off in
> which case.

I think it's a useful approach.

> - ssh uses <username> for login if not explicitly told otherwise
> -> server knows you're a Tor user anyway -> better off with shared value

Note that the "Tor user" anonymity set is much larger currently than
"user of an anonymity-focussed distro", so your conclusion (about this
example and others) is not *that* obvious to me.

Cheers,
-- 
intrigeri
_______________________________________________
Tails-dev mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to