I have a basic question about the Spoiled Onions report. The bad onions mean that someone could block traffic, could re-direct traffic, or otherwise censor content, but they couldn't de-anonymize users nor could they prevent user from re-connecting to Tor network with different nodes.
Do I understand the story? If so, am I correct? On Wed, Jan 22, 2014 at 10:36 AM, Elysius <[email protected]> wrote: > The more I read about various exit node exploits, the more convinced I > am that Tor's future is in beefing up hidden service functions and > keeping as much traffic as possible within the Tor network. > > I hope that the Tor developers see this the same way. Expanding the > usefulness of hidden services is the way for Tor to grow and be accepted. > > Elysius > > On 22/01/14 12:32 AM, [email protected] wrote: > > > http://arstechnica.com/security/2014/01/scientists-detect-spoiled-onions-trying-to-sabotage-tor-privacy-network/ > > -- > tor-talk mailing list - [email protected] > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- William N. Conlow Rutgers--Camden Law, 2013 -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
