
MITM attacks and http access (ie not https) are a risk to privacy whatever you use on the internet and TOR is no exception, and it says so on their site and TAILS site as well. the point is what can the NSA tell with their exit nodes, and it seems to be not a lot if youre doing it right. if a government fascist agency wants to look at what you are doing, they can bug you with a sticker on your computer, they can compromise your machine end point and then your encryption is useless, there are so many ways they can do you down to scanning the tiny electrical signals put out by your screen and many many other things.īut if tor was really compromised and (OF COURSE the nsa run exit nodes), then you wouldnt have any illicit activity going on there, which of course you do. basically if your threat level is ‘government’ then you are pretty much eff’d before you do anything. the main point here – does the tech work or does it not work and it does seem to work according to a lot of eyes on the source code.

the yasha levine article is silly, and you should stay off the internet completely if you dont like government funding because it was created by DARPA. You Are Literally Next.Īh someone who actually knows tech, may i ask what you think of RINA? i think its a red herring frightening people away from tor because of whomever funds it, the tech is the tech and thats it. Taxpayer-Funded Privacy Advocates, Liberal Pundits, and Nazi-Rapist-Snitch Allies Make Case for Doxxing Critics.

TOR: "Solidarity against online harassment" 'Spoiled Onions' in the Tor Network, Researchers Find High-Traffic Colluding Tor Routers in Washington, D.C., and the Ugly Truth About Online Anonymity Snowden’s First Move Against the NSA Was a Party in Hawaii Porkins Policy Radio episode 26 Peeling the onion behind Tor, EFF, and John Perry BarlowĪlmost everyone involved in developing Tor was (or is) funded by the US government Tor, CSpace And ZRTP Are Your Passport To Anonymity

But do these promises hold up to scrutiny? And who is behind the TOR Project itself? And why did a TOR developer recently doxx a critic on Twitter? Joining us today to dissect this onion stew is Pearse Redmond of Porkins Policy Review. The TOR Project promises its users a modicum of privacy protection from would-be information gatherers, both smalltime crooks and nation-state cybersecurity agencies. Podcast: Play in new window | Download | Embed
