Page 2 of 2

Posted: Sun 08 Jan 2012, 17:40
by nooby
So what did that say then? I am all ears!

Posted: Sun 08 Jan 2012, 22:03
by postfs1
It inspires me to give a names to the unknown backdoors:

1)The "no o by no o " backdoor

2)The "ny boo" backdoor = "no yes boo"

Kind of like there may be something, but may not be. It's kind of cool.

Posted: Sun 08 Jan 2012, 22:04
by disciple
catpuppy wrote:...
See here:

http://cryptome.org/0004/tor-is-tor.htm
...
disciple wrote:?!
Oh, sorry, I didn't see the link you added about Tor.
I don't see why it is a big deal to point out that a few dozen commits to Tor have come from US Navy addresses. It was originally sponsored by the Navy. And given how much they claim some people in military and law enforcement rely on Tor, we should expect them to maintain an interest in its security.
Nothing is ever invulnerable. If anyone is interested in how Tor is vulnerable, check out the "weaknesses" section on its Wikipedia page, and also http://pacsec.jp/psj11/PacSec2011_Dynam ... ors_en.pdf. As you can see, people put a lot of effort into finding vulnerabilities in Tor so that they can improve it.
Tor is open source, and the people who use it are rather interested in privacy, so if there are or have been back doors in it, people would be finding them.
sickgut wrote:See my post I posted links with proof.
?
I'm still missing the evidence for this:
sickgut wrote:
disciple wrote: Please provide references.
about TOR?
goto their site, read the info. They actually tell you they must cooperate with law enforcement and also says that they are not allowed to tell users or post on their site by what means the network is being monitored and if and when monitoring is happening.

Posted: Mon 09 Jan 2012, 04:34
by RetroTechGuy
catpuppy wrote:If someone is using truecrypt don't use it! it contains backdoors like many other software, use only open source applications.
Here:

http://sd4l.sourceforge.net/

Posted: Mon 09 Jan 2012, 16:04
by Bruce B
I thought to mention that Linux is not a US company or product, rather a world wide programming effort where military and political enemies work on the same kernel.

Can we trust that China will keep an eye out for NSA backdoors?

Seriously!?

~