-BEGIN PGP SIGNED MESSAGE-
I just heard that the Venona intercepts haven't all been decrypted, and
that the reason for that was there wasn't enough budget to do so.
Is that not enough budget to apply the one-time pads they already have,
or is that the once-and-futile exercise of
Can anyone suggest a tool for checking to see if my Tor client is performing
any surreptitious signaling?
Seems to me there's a couple of possibilities for a TLA or someone else to
monitor Tor users. Tor clients purchased online or whatever could possibly
signal a monitoring agency for when
On Tue, 4 Oct 2005, Steve Furlong wrote:
On 10/4/05, gwen hastings [EMAIL PROTECTED] wrote:
Troll Mode on:
TOR was originally developed as a result of CIA/NRL funding:)
...
BTW running TOR makes you very visible that you are running tor even as
a client.. its quite a noisy protocol
Well, the great thing about the Italians is that you can bet in large parts
of Italy the law is already routinely ignored. 6 months from now it will be
forgotten.
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: [IP] Italy requires logging of
Troll Mode on:
TOR was originally developed as a result of CIA/NRL funding:)
compile your own client and examine sources if you have this particular
brand of paranoia(I do)
change to an OS which makes this easy ...
BTW running TOR makes you very visible that you are running tor even as
a
On 10/4/05, gwen hastings [EMAIL PROTECTED] wrote:
Troll Mode on:
TOR was originally developed as a result of CIA/NRL funding:)
..
BTW running TOR makes you very visible that you are running tor even as
a client.. its quite a noisy protocol
Well, of course that feature is built in. The NSA
At 16:20 2005-10-03 -0400, R.A. Hettinga wrote:
I just heard that the Venona intercepts haven't all been decrypted, and
that the reason for that was there wasn't enough budget to do so.
Is that not enough budget to apply the one-time pads they already have,
or is that the once-and-futile