[tor-talk] Escape NSA just to enter commercial surveillance?
Andreas Krey
a.krey at gmx.de
Thu Jan 14 21:37:25 UTC 2016
On Thu, 14 Jan 2016 14:25:20 +0000, juan wrote:
...
> Of course. It's absurd. There's nothing hidden about
> facebook's location so a 'hidden' service is...nonsense.
You're attacking the name instead of the content.
Accessing facebook via the onion service means that you
know you're talking to facebook directly; using facebooks
via either tor or directly exposes you to the risk of
being MITM'd, including faked SSL certs.
Even if the NSA is capable of brute forcing the onion key
facebook itself could build a canary by trying to access
its own onion service. If the connection ending back up
with them has strange properties they know something
is wrong.
...
> > NSA would immediately command Facebook to offer the related user
> > identification.
>
> ...assuming facebook isn't already fowarding relevant data in
> real time, all of the time...
Facebook doesn't necessarily have identifying information on
their users.
Andreas
--
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800
More information about the tor-talk
mailing list