Why you guys use JAVA for such a security concerned email client?
JAVA itself isn't secure and most relayable computers don't have
a virtual machine. You know JavaSnoop and vm-hookers like that?
Just rewrite it into plain C imho...
/jo
> Gesendet: Mittwoch, 18. September 2013 um 02:26 Uhr
> Von
Was there a discussion about the 'cables-communication'
approach from Liberte-Linux in the mailing list?
What's the general oppinion here?
Is it trustable/secure/relyable?
best /jo
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.tor
Can a developer please explain to me why something like the
following obfuscation of 'torified traffic' is exploitable?
Suppose a scenario where a collective of authorities is able
to observe large parts of the www. Then observing traffic
correlation can unreveal a connection through the network.