[LINK] Aust: 'Coonan seeks to censor the Web'

Rick Welykochy rick at praxis.com.au
Fri Sep 28 11:23:59 AEST 2007


Daniel Rose wrote:

> Also one needs to be careful of what's running through it!
> http://www.derangedsecurity.com/time-to-reveal%e2%80%a6/
> 
> All sorts of people can and do setup exit nodes to sniff for interesting bits and pieces.

People using Tor must be idiots. They prolly think their traffic
is encrypted end-to-end or some such nonsense. The only way I would
use Tor or similar is if my original traffic was encrypted.

The detection and publishing of a list of usernames and passwords
to email servers at gummints and embassies around the world is
an excellent idea. That information can be considered public if
it is sent in plaintext around the Internet.

Negative points to the idiots at gummints and emabssies etc using
Tor thinking that were getting some form of increased security.
All Tor does is hide your originating IP address.

More lists like this should be published. I see no legal reason to
stop it. It is like publishing any publicly knowable information.
And one does not need a packet sniffer on a Tor exit point to do it.
Anyone working near an Internet router anywhere in the world can
gather this kind of information. It is publicly available to
literally millions of people working in IT.

The solution? Use encrypted protocols! Secure POP, IMAP and SMTP
along with https: and the SSH suite go a long long way to securing
your communications from prying public eyes and big bothers like
Echelon.


cheer
rickw


-- 
_________________________________
Rick Welykochy || Praxis Services

Q: What's the difference between a software sales person and a car sales person?
A: With a car sales person there is a slight chance that he actually knows how to drive.



More information about the Link mailing list