Thursday, August 29, 2013

"Tor must be used correctly" - IT.Branschen

– You think that your traffic is protected, but it need not be.

class=”paragraphIntro”> It says Dan Egerstad . It was he who in 2007 used his Tora connection to snatch up thousands of secret passwords to embassies and companies, which he then published. He became known as “Embassy hacker” and as “the world’s best hackers.”

His disclosures led to the police raid at his home, but there was no prosecution. Dan Egerstad, which is now a security consultant, says he was just looking to see how vulnerable the system can be.

– Thu used in a wrong way , he says.

By that he that users have expectations that Tor can not fulfill.

Outsiders can, at least in theory, identify traffic in the Tor network and draw conclusions. They can also monitor the output nodes in the Tor network and the thief read outcoming messages.

– Have You then signed with your name, it’s not that hard.

class=”paragraphIntro”> Messages that leaves Tor network after last node is not encrypted by Tor. So it may be appropriate to encrypt them yourself.

Dan Egerstad notes that all the starting nodes in the Tor network monitored by criminals and, by all accounts, the intelligence services.

To communicate ospårbart, he explains, so enhancing Tor your chances – with an emphasis on improving.

– The remarkable that so many of the nodes in the Tor in Washington and has high capacity.

No comments:

Post a Comment