sslug-teknik team mailing list archive
-
sslug-teknik team
-
Mailing list archive
-
Message #95754
Re: KDE: Tor og TorK
Jakob Bruun Hansen wrote:
> Stig Mogensen skrev:
>
>>> Jeg kan ikke hjælpe, men vil blot pointere, at Tor i sig selv ikke
>>> forhindre dig i at blive overvåget. Snare tværtimod, da andre i
>>> tor-netværket kan læse din trafik, hvis du ikke supplerer tor med en
>>> krypteret forbindelse...
>
>> Brugbar oplysning ;o) Tak.
>
>> Men hva' så?. VPN til købeadgang på proxy etellerandet sted i et meget
>> fremmed land?
>
>> /Stig
>
> Det jeg refererer til er denne sag (som næppe står alene) (fra wikipedia):
>
> "In September 2007, Dan Egerstad, a Swedish security consultant, revealed
> that by operating and monitoring Tor exit nodes he had intercepted
> usernames and passwords for a large number of email accounts.[6] As Tor
> does not, and by design cannot, encrypt the traffic between an exit node
> and the target server, any exit node is in a position to capture any
> traffic passing through it which is not encrypted at the application
> layer, e.g. by SSL. While this does not inherently violate the anonymity
> of the source, it affords added opportunities for data interception by
> self-selected third parties, greatly increasing the risk of exposure of
> sensitive data by users who are careless or who mistake Tor's anonymity
> for security."
Det står jo i kontrast til hvad Tor selv skriver på deres side;
http://www.torproject.org/torusers.html.en
Trist.....
Men igen, hvad gør man så for at beskytte sig mod, og i protest over, disse
forskellige myndighedernes brud på privatlivets fred?.
/Stig
--
* Registered Linux user #291266, with http://counter.li.org.*
References