If the protocol was more secure we would not have to keep it in the same place. Why not make hidden services more client like? A lot of servers of exploit do why not a bundled server and php and mysql that goes through Tor? If we did that it would secure hidden services. On Aug 26, 2013 4:45 AM, "grarpamp" <[email protected]> wrote:
> On Sun, Aug 25, 2013 at 5:05 PM, <[email protected]> wrote: > > And don't you guys want answers?? > > Sure, please post your answers in the form of links to verifiable > reports of hidden services being 'found and taken down' due to > *exploited vulnerabilities in the Tor protocol*, not some other, or > as yet unknown, reason. > > No one has posted any legal documents yet, just a bunch of > 'news' and user error. That's not to say there won't be any, > there very well could be... > > Tor has design writeoffs. Tor has known vulnerabilities. > If those bother you, contribute research and fixes, or > don't use Tor (or anything else for that matter since > none in the field have been fully proofed). > -- > tor-talk mailing list - [email protected] > To unsusbscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
