It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: jrod
My world revolves around the inside of a breaking wave. I do not live in the 'real world' by any means. I hope to better understand the nodes one of these posters spoke of.
originally posted by: Sharted
I came across this document on Cryptome and wanted to get other people's opinions on it:
cryptome.org...
It sounds like they think anyone who uses Tor is an extremist or something, or at least that's what I thought. I rarely use Tor but it's nice to have on my computer because I tire of Google's constant "logged in" philosophy sometimes. Yes I know you can use incognito mode, but it's not quite the same.
the question crosses my mind about how those two parties come to agree to share an encrypted line of communication?
originally posted by: jrod
a reply to: opethPA
Whose talents exactly was I dismissing?
I know several very talented computer programming types. The kind that can make a C++ Hanoi tower program in less than 5 minutes.
My point is, computer code, language continues to evolve. Some algorithms are apparently worth good money to the NSA. The just bought a bunch of bit coins as a result of the silk road sting auction for above market price. That tells me something about the value of an algorithm.
originally posted by: jrod
a reply to: opethPA
Just because it took very little effort to dig up. There are threads on ATS that touch on this news article. I could go on, but I don't have the time to turn this into a debate.
www.koaa.com...
Great post though.
originally posted by: Xtraeme
a reply to: Kandinsky
Even then though we'll probably have to setup websites to use something like Diffie-Hellman rather than one size fits all trapdoor RSA-type encryption.
originally posted by: MarlinGrace
Everyone can thank the Global warming expert Mr. Gore for the RSA backdoor.
The "meta data" the two IP addresses, MAC addresses are all recorded and everything in the middle if they feel is worth the trouble will be looked at seriously.
originally posted by: KyoZero
a reply to: jrod
Those exits are not always safe
we’re able tie the use of Tor exit nodes to the use of illegal services and specific malicious actors, as well as to identify conflict between competing hackers and services...
this analysis effectively strips away the anonymity and security of Tor through novel and open exploration of a wealth of data...