TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Tor Wars: The Signal Awakens

108 点作者 vishnuks超过 9 年前

2 条评论

mark_l_watson超过 9 年前
An important point the article makes is how important it is for a large number of people to use Tor, even if only occasionally. I try to use Tor at least once or twice a week for general web browsing. I also donated money to them.<p>It is really important for people to also support groups like the EFF and ACLU financially: a good investment in future freedom. History shows that large empires tend to get tough on their citizens as the empires wane. We live in an era right now where the current large empire is waning.
评论 #10528936 未加载
评论 #10529146 未加载
评论 #10529472 未加载
评论 #10529092 未加载
hackuser超过 9 年前
I don&#x27;t agree with this statement from the article:<p><i>This, and Tor’s history of US government sponsorship, has led to series of really embarrassing conspiracy theories from the likes of PandoDaily. This is why non-technical journalists should not write about technical subjects. If you’re going to suggest that open-source software has dark ulterior vulnerabilities,</i> you need to point at exactly where they are in the code (or deployment process), <i>or you will quite rightly be laughed out of the room. Funding and relationships are not unimportant — and I’m sure Pando will now write me off as part of the shadowy conspiracy, as Tor developer Jacob Appelbaum is an old friend — but it’s the running code that actually matters. Sadly, non-engineers don’t seem to understand this, or how laughably ridiculous they look as a result.</i><p>The author, Jon Evans, seems to imply this is a widely accepted standard, which is not my experience. It also doesn&#x27;t seem realistic: While it&#x27;s great that open source software&#x27;s source code is available, it&#x27;s not possible to review it all much less to catch subtle exploits that might have been introduced by security agencies - we can&#x27;t even catch many unintentional exploits. Also, we know from leaks that security agencies have tried and have succeeded at times. Realistically it comes down to trust.<p>Think of it this way: How many HN readers, a sophisticated population, have reviewed Tor&#x27;s code? How many feel they have no choice but to choose either to trust them or not? Also, how many open source projects have had security audits performed by anyone?
评论 #10529516 未加载
评论 #10529446 未加载
评论 #10529207 未加载
评论 #10529652 未加载
评论 #10529266 未加载