--- On Tue, 7/31/12, Katya Titov <[email protected]> wrote:

> From: Katya Titov <[email protected]>
> Subject: Re: [tor-talk] Free WiFi Bootable Ditros
> To: [email protected]
> Date: Tuesday, July 31, 2012, 5:06 AM
> jed c:
> > I wouldn't recommend TOR for anything personally
> identifying
> > (anything done on TOR has a chance of greater scrutiny
> and malicious
> > subversion).
> 
> Agree with that, however just because I'm using Facebook
> doesn't mean I
> will be identifying myself ... ;-)

That might be possible (not identifying yourself). But a few risks may remain. 
Consider the following: Have you ever used facebook before? Do you or have you 
talked in the past (FB email chat) with the people you are planning to 
communicate with? Do these people have any particularly identifying ideology?
Here is the problem I see with facebook. You have a biometric characteristic to 
the way you type. This can narrow the probability of who you are say to 1 in 
25,000. The same can be said for the people you talk to. If you have previously 
communicated on facebook there is likely a signature there. There are millions 
on facebook but each additional person you friend is going to narrow down the 
possible network. If you friend a previous friend on facebook now the combined 
signature is more unique. The ideology part ties into the topics and words that 
people use which is also identifying. If you have the advantage of 
communicating in a different language and alphabet I'd recommend it.


> 
> > Have used Facebook through TOR with SSL enabled and
> watched a friends
> > computer get exploited during a chat session. SSL is
> pretty well
> > broken from my point of view.
> 
> I've seen a single SSL MITM, but that's it. I'm not a fan of
> SSL and see
> major issues, but I think it's far from broken.
> 
> > I wouldnt trust TOR for any executable download or
> software update
> > (pdfs and other exploited forms of media are
> questionable too). Best
> > use for tor is in a read only environment where no
> writable media is
> > present on your computer. I would recommend locking
> your bios, it
> > might not matter if there is a default secondary
> password.
> 
> I'm not sure that I'm quite that paranoid, but Tails can
> certainly
> provide a read-only environment.
> 
> Tails may not be designed for open WiFi networks, but until
> something
> else comes along it may be the best solution for my needs.
> -- 
> kat
> _______________________________________________
> tor-talk mailing list
> [email protected]
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
_______________________________________________
tor-talk mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to