[AusNOG] Data retention

Tim Coombs timc at slowb.ro
Wed Oct 14 07:25:23 EST 2015


Im sorry Mr. Pink,
But you seem to be misinformed about TOR. The only way in which you can undoubtedly know who a single person is on tor is controlling the Entry and Exit nodes. If you can control both you can do a timing correlation attack. This is a known issue and for more information on in please refer to https://www.torproject.org/docs/faq.html.en#AttacksOnOnionRouting   
Could you sight a paper or technical article for your reasoning/belief that TOR is 'unsafe'? 

Now while I do not mean to personally attack you, I do believe that TOR should be people's first point of call in anonymizing their retention data. And pose the question to the whole list if they have any technical documents of TOR's failings (reply off list). As a VPN is a single entity/company that could easily be strong armed to turning on logging and then you end up in the same boat as others. 

Why pay money to a company when there is a free, community run option?

Cheers,


On 13 October 2015 12:44:32 pm AEDT, Robert Hudson <hudrob at gmail.com> wrote:
>On 13 October 2015 at 10:00, Mister Pink <misterpink at gmail.com> wrote:
>
>The privacy/anonimity of TOR is known to have been broken a while ago.
>Sorry.
>
>> Lets agree on this list to call a spade a spade, and not concede
>moral
>> high ground to people who may not deserve it...
>>
>
>------------------------------------------------------------------------
>
>_______________________________________________
>AusNOG mailing list
>AusNOG at lists.ausnog.net
>http://lists.ausnog.net/mailman/listinfo/ausnog

-- 



More information about the AusNOG mailing list