Tx for that piece of information and the url. I believe Shaun, a member of this list suggested some time ago, when we were discussing the Silk Road case that by operating a large number of Tor
nodes, it might be possible for an organisation to make it a lot easier to isolate and find out individual I.P. addresses and deanonymise users. It looks like he was right...:-) .
Expectations of privacy being less than expected means that those things which folks thought might be private, in fact aren't. And the use of the phrase as a legal term and its continuing extension in legal ambit means that the legal system and the government law enforcement services at home and abroad can avoid the various amendments to the Constitution or the right to privacy and the security of communications of the individual.
Let us hope that all those people who use TOR, including those who do it for legitimate reasons, such as those helping with the liberation and freedom struggles throughout the world take note and realise that they aren't quite so safe as the US government and other advocates make the use of TOR out to be. Personally, I have always thought it was suspect and never used it...ig only because of its connection with the US armed forces. Though, again, I have never had a need for it, as I am fortunate that I am not involved in those, secret areas of world communications, or living, as yet, in a dictatorship. We have come a long way, since World War 2 and the time when Bletchley Park was very proud that it received communications from the Wermacht which communicated by radio and telephone without any encryption at all. Didn't last long...:-)
I am beginning to think that if there is a way found of encrypting and making end to end communications anonymous, where the governments of the world and any other organisations cannot break into it, and where there was some kind of international legal agreement that such communications could not be subject to a search warrant, and that any organisation which was found to be trying to hack into the said forms of communication would be guilty of a very serious offence; then the only people who will use it will be those who are criminals, terrorists and members of secret organisations like the C.I.A. G.C.H.Q and other intelligence and security services.:-) .
Let us hope that government communications are encrypted satisfactorily and anonymous as they would like. Perhaps they have their own software and forms of secret communications which they aren't telling us about...:-) ...including Snowden. Personally, I think that the least worst solution is that a search warrant which includes reasonable suspicion or probable cause would be the best way forward. But according to Hayden, such an approach is very expensive in terms of time, resources and costs, which is why the present illegal, unlawful forms of mass collection, storage and monitoring are used with selectors. In the UK, there are proposals to change this position,and make such collection legal, though there have been some cases in the European Court which have outlawed this approach. This is to be done by a new Act of Parliament called DRIPA.
On 24/02/2016 14:34, Michael Best wrote:
"Also, the reason for not providing any more info on the attack? Tor users can't expect privacy, apparently" picture quote: https://twitter.com/josephfcox/status/702500537204256769
Veritas aequitas liberabit vos
Veri universum vici
That 1 Archive <http://that1archive.neocities.org/>
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: SKS 1.1.5
Comment: Hostname:pgp.mit.edu <http://pgp.mit.edu>
-----END PGP PUBLIC KEY BLOCK-----