On 30/06/13 at 01:04am, Jacob Appelbaum wrote: > Yeah, about that... > > Have you seen the most recent paper by Egger et al?
IMHO that's is unfair. There are many publications on Tor vulnerabilities as well, and this is unavoidable. Are you sure that in the next two months Tor will not be the main actor of a similar publication? You should have pointed us over principles and design, rather than vulnerabilities. By principles, I like i2p more than tor, for its decentralization, and for its focus on providing an "anonymous" network layer than a "exit point" to existing internet. But this is completely personal, and each of us as his/her requirements to satisfy. And, by the way, I am aware that the most important bug (which can't be corrected) of any systems is the human who is using it. With respect, danimoth _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography