pointerGli attacchi dell’NSA verso Tor

Bruce Schneier sul Guardian: non sono riusciti a violare il protocollo di Tor, ma semplicemente a tenere sotto controllo il computer di una persona sospetta.

“The good news is that they went for a browser exploit, meaning there’s no indication they can break the Tor protocol or do traffic analysis on the Tor network,” Dingledine said. “Infecting the laptop, phone, or desktop is still the easiest way to learn about the human behind the keyboard.

“Tor still helps here: you can target individuals with browser exploits, but if you attack too many users, somebody’s going to notice. So even if theNSA¬†aims to surveil everyone, everywhere, they have to be a lot more selective about which Tor users they spy on.”