It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: shaneslaughta
a reply to: Sharted
Tor's security is based on the security and trust of the exit nodes. Anyone can run an exit node and anyone can monitor all traffic that goes over them.
If you only use a trusted exit node such as a friend or family member you will be safe.
To be totally honest, if you want security use a VPN.
originally posted by: hombero
I would recommend 256 bit AES encryption, assuming we are talking about VPN encryption algorithms, as it is generally assumed that 128 bit AES will be brute-forceable soon (2030 and beyond).
Also, it's much, much more likely that one end of the VPN tunnel is going to be compromised and that's what leaks your data, not the algorithm itself
originally posted by: MarlinGrace
originally posted by: hombero
I would recommend 256 bit AES encryption, assuming we are talking about VPN encryption algorithms, as it is generally assumed that 128 bit AES will be brute-forceable soon (2030 and beyond).
Also, it's much, much more likely that one end of the VPN tunnel is going to be compromised and that's what leaks your data, not the algorithm itself
How is it possible to decrypt one end when it takes both keys to decrypt?
originally posted by: Kandinsky
a reply to: Sharted
It's a scary article. Sure, we all know that the Tor network was infiltrated by various intelligence agencies and that the NSA 'own' a proportion of the network. The scary part of the article is what will happen to people who search 'tor,' access the tor website, search for 'tails' or use the Tor network.
IPs are logged and stored whilst the traffic from that IP is scrutinised as if the owner is a threat to US security. This implies that anyone who has searched 'tor' will have subsequent searches logged and stored. By extension (the scary part), the simple act of showing an interest in anonymity will get you marked for surveillance.
The dragnet nature of this automated process means too much metadata for human agents to digest and analyse. There'd presumably be another filter to escalate the searches of individuals to a higher level of scrutiny. So downloading Tor to porn-cruise will get you listed by machine, using it to visit Arabic sites or technical specifications of chemical explosives will get you more personalised attention.
It's alarming how little is now needed to find yourself on a 'watch list.'
originally posted by: jrod
The NSA wishes they could hack Tor. They can not.
They simply lack the talent. No computer programing wizards are willing to work for the NSA under the conditions and wages they offer.
They have minor league talent and are only fooling themselves to believe they can out hack the world's best.
originally posted by: jrod
The NSA wishes they could hack Tor. They can not.
They simply lack the talent. No computer programing wizards are willing to work for the NSA under the conditions and wages they offer.
They have minor league talent and are only fooling themselves to believe they can out hack the world's best.
originally posted by: Xtraeme
a reply to: Kandinsky
Hey K. Ever since the discrete logarithm problem was part solved. I no longer put much bank in SSL certs. HTTPS Everywhere was great while it lasted. Frankly, RSA should be treated as though it is compromised. The only way the internet will have real anonymity again is if we put real effort into Meshnet. Even then though we'll probably have to setup websites to use something like Diffie-Hellman rather than one size fits all trapdoor RSA-type encryption.