Full Disclosure mailing list archives

Re: Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily


From: Jack Morgan <kuriosly () gmail com>
Date: Thu, 17 Jul 2014 17:08:51 -0700

Also, remember that Tor was developed as a weapon to be used against
advanced threats and States of some power, as a way of providing
discontents of means of communicating and resisting authority. Its one of
those plans that backfired against the US government when it started to be
used to avoid its own detection.

so yay for US cov-ops tech. Because there needs to be a justification for
things governments throw money at. Even if we don't see it.


On Thu, Jul 17, 2014 at 4:36 PM, <devel () roosoft ltd uk> wrote:

On 17/07/14 01:10, Ivan .Heca wrote:
Funding doubled, so engineering some back doors?

In 2012, Tor nearly doubled its budget, taking in $2.2 million from
Pentagon and intel-connected grants: $876,099 came from the DoD, $353,000
from the State Department, $387,800 from IBB.

That same year, Tor lined up an unknown amount funding from the
Broadcasting Board of Governors to finance fast exit nodes.

http://pando.com/2014/07/16/tor-spooks/

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

You might find this interesting then.
https://www.youtube.com/watch?v=CJNxbpbHA-I

The code is not the weak point, the idea that State funded operations
can co-op enough exit nodes to subvert the network and make a difference
is.

--


_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Current thread: