Tor: Exploiting the weakest link

Discussion in 'privacy technology' started by lotuseclat79, Dec 31, 2013.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  2. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    It always seems to come back to that. It's not unlike those who install a pile of security apps and call it layered security. Instead of treating Tor as a tool and learning to use it properly, users view it as a solution that does the job for them. When your potential adversaries are corrupt corporations, governments, and 3 letter agencies, there is no "set and forget" solution.

    The authors comments regarding Facebook point out the real problems. Besides not understanding Tor and its limitations/abilities, they don't understand the problem or even the concept of privacy. There's no point in logging onto Facebook via Tor unless you're in hiding or you created the account via Tor in the first place using false information. I have to wonder what percentage of the traffic on Tor is de-anonymized by the user (like logging into something under your real name) or didn't need to be anonymous in the first place.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.