On 04/01/12 19:24, Geoff Down wrote: > Let's try that again... > http://pastebin.com/jBPFsUSg > "We did crack Tor's encryption to reveal 190 IP addresses of individuals > using Tor for Child Pornography"
They didn't "crack Tor's encryption". They posted a fake "Tor security update" on one of the Hidden Wiki pages. It was actually malware that sent true IP addresses to their server(s) when Tor wasn't running. TAILS would have prevented that, because there's no history. Using a Tor gateway VM would have prevented that, because there's never Internet connectivity except through Tor. Connecting to Tor through a VPN service would have provided a safety net (to the extent that the VPN provider protects users' privacy). _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk