Hi,
the metrics page shows that the performance of the Tor network degraded during
the last 7 days from around 1.5 sec per 50kb towards 2 secs to complete a 50kb
request:
https://metrics.torproject.org/performance.html?graph=torperfstart=2013-02-18end=2014-02-16source=allfilesize=50kb#torperf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Rusty Bird:
Patrick Schleizer:
The problem is, any Whonix-Workstation behind Whonix-Gateway -
once compromised - can claim to be another Whonix-Workstation,
thus not being stream isolated anymore.
This could be solved, when there was a
95 standard keyboard chars x 16 randomized yields 2^105+ which
isn't likely to be a real crack risk given the rest of the platform.
They're just hard to memorize. Longer word based entropy of
the same strength will likely be hard to memorize as well.
Consider adding in other key material