LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices

Reply
 
Search this Thread
Old 06-16-2013, 06:25 AM   #31
unSpawn
Moderator
 
Registered: May 2001
Posts: 27,293
Blog Entries: 54

Rep: Reputation: 2855Reputation: 2855Reputation: 2855Reputation: 2855Reputation: 2855Reputation: 2855Reputation: 2855Reputation: 2855Reputation: 2855Reputation: 2855Reputation: 2855

BTW kind of difficult since I'm participating but at this point I'd like to ask all involved to please review your own posts and be critical about how you express yourself. It would be a shame to have a (perceived) lack of constructive atmosphere and general friendliness, netiquette, common sense or other way-too-personal provocations hinder unfolding of topic(s),
TIA.
 
Old 06-16-2013, 08:33 AM   #32
H_TeXMeX_H
Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269
Quote:
Originally Posted by unSpawn View Post
So I have to ask you to present authoritative, unambiguous information as related to "TOR being pushed and promoted suggesting that something is behind them too". Thanks in advance.
Well, here are some things to consider:
1) Tor is the most popular online anonymity program.
2) Tor does not support end-to-end encryption.
3) There exist programs that are less popular than Tor, such as freenet, that do support end-to-end encryption.
4) Tor is mentioned in the news often, while I've never seen freenet or other programs mentioned at all.
5) There exist known and potentially major vulnerabilities in Tor (especially when compared to freenet):
http://en.wikipedia.org/wiki/Tor_%28...%29#Weaknesses
6) The group known as "Anonymous" operates at least in part using the Tor network.
7) The group known as "Anonymous" still exists since 2003 and has not been taken down, even tho they have committed many crimes.
8) The group known as "Anonymous" has nothing to do with anonymity, and has been known to compromise anonymity in numerous cases:
http://www.technewsdaily.com/7294-an...hild-porn.html
http://techland.time.com/2011/11/22/...-investigator/
http://abclocal.go.com/kgo/story?id=8534137
http://www.bizpacreview.com/2013/03/...fficials-57148
and the list goes on, just search it.
9) Current media articles recommend Tor + HTTPS for anonymity.
10) HTTPS relies upon SSL certificates from the CA.
11) News of fake SSL certificates are ubiquitous:
http://www.zdnet.com/blog/networking...web-sites/1428
http://www.eweek.com/c/a/Security/Fa...counts-270126/
http://www.networking4all.com/en/ssl...+certificates/
http://blog.trendmicro.com/trendlabs...es-seen-again/
12) Tor is a hotbed of illegal activities.

Conclusions from this:
1) Tor is the most popular and advertised, but not the best anonymity program.
2) Tor has potentially major vulnerabilities, unlike other programs like freenet.
3) The group known as "Anonymous" commits illegal activities using Tor, destroys the anonymity of Tor users, and yet manages to escape the law.
4) Tor + HTTPS is not significantly secure than Tor alone due to the ease of faking SSL certificates, especially by powerful entities.

Meta-conclusions, these are not 100% verifiable, but then what is.
1) There is great power behind Tor and the group known as "Anonymous", which explains the previous data. I accept other explanations as long as they make sense, although no one every provides them, instead they ask for "proof" and say I'm spreading FUD. Whatever, you have your opinions and I have mine.

Last edited by H_TeXMeX_H; 06-16-2013 at 08:34 AM.
 
Old 06-16-2013, 08:45 AM   #33
teckk
Senior Member
 
Registered: Oct 2004
Distribution: FreeBSD Arch
Posts: 1,752

Original Poster
Rep: Reputation: 189Reputation: 189
We don't have to obey the 4th amendment if we don't want to.

http://m.cnet.com/news/nsa-admits-li...rants/57589495
http://www.law.cornell.edu/constitut...urth_amendment
 
Old 06-16-2013, 12:09 PM   #34
H_TeXMeX_H
Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269
Snowden NSA Claims Partially Confirmed, Says Rep. Jerrold Nadler
http://yro.slashdot.org/story/13/06/...jerrold-nadler
 
Old 06-16-2013, 07:23 PM   #35
linuxCode
Member
 
Registered: Jun 2013
Location: New York City
Distribution: Arch
Posts: 33

Rep: Reputation: 43
I wonder why people are not protesting this bill on cyberspying. If they feel this is wrong they should fight it.
 
Old 06-16-2013, 07:27 PM   #36
k3lt01
Senior Member
 
Registered: Feb 2011
Location: Australia
Distribution: Debian Wheezy, Jessie, Sid/Experimental, playing with LFS.
Posts: 2,683

Rep: Reputation: 558Reputation: 558Reputation: 558Reputation: 558Reputation: 558Reputation: 558
Quote:
Originally Posted by H_TeXMeX_H View Post
I accept other explanations as long as they make sense, although no one every provides them, instead they ask for "proof" and say I'm spreading FUD. Whatever, you have your opinions and I have mine.
No you provide opinion based on what you seacrh out but state it as fact. Others provide opinion and give evidence, for their opinion, that you refute with wikipedia that in itself is a ver poor source of information.

You seek conspiracy out, you even go so far to say that you wont vote in a poll but you publicly state your opinion in the very same thread.
 
Old 06-17-2013, 04:13 AM   #37
H_TeXMeX_H
Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269Reputation: 1269
Quote:
Originally Posted by k3lt01 View Post
wikipedia that in itself is a ver poor source of information.
Prove it. You are spreading FUD.
 
Old 06-17-2013, 05:23 AM   #38
k3lt01
Senior Member
 
Registered: Feb 2011
Location: Australia
Distribution: Debian Wheezy, Jessie, Sid/Experimental, playing with LFS.
Posts: 2,683

Rep: Reputation: 558Reputation: 558Reputation: 558Reputation: 558Reputation: 558Reputation: 558
Quote:
Originally Posted by H_TeXMeX_H View Post
Prove it.
First sentence straight from the horses mouth. At last a usage of wikipedia that is relevant.

Quote:
Originally Posted by H_TeXMeX_H View Post
You are spreading FUD.
No I am spreading fact, fact that even your poor source agrees with.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
email data mining? kbajwa-linuxquestion Linux - Software 4 06-10-2008 05:46 AM
data mining and data warehousing software A_sim Linux - Software 1 01-16-2006 09:25 PM
Home Office Biotech Data Mining - Data Collection Adler Linux - General 20 11-03-2004 04:17 AM
Biotech Data Mining Adler Linux - Software 2 10-31-2004 03:03 AM
Data Mining and how to stop it ????? bigjohn Linux - Security 11 10-27-2003 01:50 AM


All times are GMT -5. The time now is 09:11 AM.

Main Menu
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration