Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In the slide titled "Exploitation: Shaping" the status says "Can stain user agents working on shaping."

How do they achieve to make tor use NSA/GCHQ nodes? If they achieved to do this 5 years ago (the PDF is from 2007) would it then be reasonable to assume that since then they have managed to modify the TOR source code in a way that nobody remarked to do exactly this?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: