Talk:German police seize Tor anonymity servers

Latest comment: 16 years ago by Divol in topic add links

please contact me via email if you need more info. Shava Nerad, Tor executive director shava -at- freehaven -dot- net -- thanks!

Can someone familiar with Tor, in practice, whether the protocol provides for invalidating nodes known to be compromised? What mechanisms prevent the police from plugging the confiscated computers back into the Internet and enabling Tor's logs to compromise larger sets of the network? My understanding of onion routing is that if a significant threshold of conspiracy between nodes takes place, the anonymity of the entire network is compromised. zuzu 14:07, 12 September 2006 (UTC)Reply

That's a good question for an interview, I've emailed Shava and asked if he would be interested, hopefully along with some of the admins of the siezed machines. --Brian McNeil / talk 14:40, 12 September 2006 (UTC)Reply
edit

95/46/EC in Wikipedia

Why the protection anyway? --Sigmundur (talk) 14:32, 6 August 2008 (UTC)Reply

this wiki is about news, ,not an encyclopedia. You write news with knowledge you have, a news very right one day could be very different the next day even wrong. the protection is to fix the news to a date for future use or analyse by some historian or cyclopedian for example. Jacques Divol (talk) 16:14, 6 August 2008 (UTC)Reply

Incorrect Wired Article link

edit

The old link to the Wired article doesn't work, but here is the URL of the same article correctly formatted: http://www.wired.com/threatlevel/2006/09/german_tor_netw

Return to "German police seize Tor anonymity servers" page.