Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's more that we know very well that up to the transmission point, it creates a unique identifier. If we're following the most likely guess (that this is targeting distribution of Child Pornography), then it seems like a reasonable goal to simply identify and fingerprint Tor users.

That being said, there is always a point that this could be used for something else entirely, though. Compromising Tor mail is a lot less of a targeted attack.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: