Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Jimmy Chen
Technically, the most effective way of avoiding TOR Exit nodes snooping in on you is not using TOR in the first place. This is a genuine answer, I'm not being sarcastic. But you open yourself up to communications sniffing, wiretaps, mass surveillance and other NSA operations vs the option of 2% of

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Jimmy Chen
I never said properly and ethically certified, did I. On Jul 1, 2013 8:25 PM, "adrelanos" wrote: > What happens if JonDo certified mixes do things forbidden by certification? > > Jimmy Chen: > > If you want your exit nodes to be certified, it's probably best at thi

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Jimmy Chen
There are malicious TOR Nodes, and you can't stop that from happening. But it is up to the service providers to enable encryption on their servers, removing the possibility that such data can be intercepted. You shouldn't trust your information to be sent through a plaintext protocol to begin with,

Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread Jimmy Chen
This poses a really interesting question. Another solution would be to use already existing remailers, and doubling the encryption together with the TO: email in the inline plaintext. The question is how to properly do a dual encryption. My proposed solution is the following: Plaintext message (