tag:blogger.com,1999:blog-37798047.post5915587146496941069..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: Anonymity Smackdown: NSA vs. TorDavid Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-37798047.post-8957126739538153452013-08-08T13:50:25.828-04:002013-08-08T13:50:25.828-04:00The discussion of "only three nodes in a circ...The discussion of "only three nodes in a circuit" is factually inaccurate. If an adversary controls just the entry and exit node, they can deanonymize the traffic. The Tor project would ideally want to use just two-hop circuits for efficiency (since it is absolutely no less secure than three hops), but they have found that having new nodes be middle nodes is a good testing phase.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37798047.post-7252147875523329172013-08-07T08:50:35.945-04:002013-08-07T08:50:35.945-04:00you need to combine tor with a vpn for maximum eff...you need to combine tor with a vpn for maximum effectiveness. encrypt all the things.Anonymousnoreply@blogger.com