On Fri, 02 May 2014 10:55:15 +0200
Aaron Zauner wrote:

> Bashing on Tor does not help here.

The page suggests all devs use Tor to avoid being targetted. 

I am saying, does it accomplish that and is is best practice. Should
they be hackable even if they are targetted or stumbled upon. I find
that highly questionable and I am suggesting other simpler policies
will be far more effective. Hiding is fine but not at the cost of
complexity where security (confidentiality/protection/unexploitability)
is paramount.

I also mentioned ssh which I believe all the devs are using already. I
am not going to say which VPN/SSH is best for the devs, I wouldn't
know. I expect they would not choose commerical proprietary
insecure CISCO you compare to TOR though in any case.


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/519419.15824...@smtp146.mail.ir2.yahoo.com

Reply via email to