Personal Cloud (was: Did Ed Snowden do the right thing?)

Aaron Toponce aaron.toponce at gmail.com
Wed Jun 12 09:12:22 MDT 2013


On Tue, Jun 11, 2013 at 10:15:08AM -0600, Ryan Moore wrote:
> On this topic, is anyone familiar with how TOR or Tails could be affected
> by PRISM or other surveillance techniques?

If you control both an entry node and an exit node, the whole Tor system
is defeated. You can see which IPs are connecting to Tor, and what sites
they are visiting.

Further, just because you are using Tor to browse HTTP or other protocols,
doesn't necessarily mean you are using it for your DNS queries, unless you
thought of this in advance.

As such, while Tor is awesome, and a great way for whistleblowers to
communicate with journalists, make sure you stay grounded and level-headed.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 519 bytes
Desc: not available
URL: <http://plug.org/pipermail/plug/attachments/20130612/a5d0a4b0/attachment.sig>


More information about the PLUG mailing list