Eric H. Johnson on 5 Oct 2013 04:46:19 -0700

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Tor project, NSA, and our September presentation

I may be speaking out of context since I did not attend that particular meeting, but as I read it, that article seems to have a significant misunderstanding of Tor.

There is no difficulty in identifying who is running Tor, DPI will reveal that, the purpose is to anonymize activity once it is run. There are means of hiding Tor within other types of traffic to make it harder to block. These techniques are used mainly to circumvent places in the world like China which actively tries to block Tor traffic not specifically to hide who is running Tor.

TAILS is a zero footprint implementation of Tor, meaning that once the LiveCD instance is shutdown, there is no record of ones activity as it has no persistance. All activity is stored in memory, so disappears once it is shutdown.

Lastly I did not see that the article clarified that the Tor browser bundle vulnerability only applies to Windows.


Sent from Samsung Mobile

-------- Original message --------
From: "Eric at" <>
Date: 05/10/2013 6:31 AM (GMT-05:00)
To: Philadelphia Linux User's Group Discussion List <>
Subject: Re: [PLUG] Tor project, NSA, and our September presentation

This is another interesting piece from Bruce Schneier:

One of the links in the comments is tails ( which is based
on Debian.

#  Eric Lucas
#                "Oh, I have slipped the surly bond of earth
#                 And danced the skies on laughter-silvered wings...
#                                        -- John Gillespie Magee Jr
Philadelphia Linux Users Group         --
Announcements -
General Discussion  --

Philadelphia Linux Users Group         --
Announcements -
General Discussion  --