On Sun, 28 Oct 2007 10:24:30 +0100 (CET), Anonymous wrote:
> You can use Tor for anonymity, and privacy on your end of the network
> because it keeps your data safe from eavesdroppers until it leaves the
> Tor network. There's also an element of privacy added by Tor to the
> other end of the connection as long as you don't specifically transmit
> privacy-trashing data like user names and passwords. Since your
> identity is disassociated from any content, your privacy is maintained
> as long as the content doesn't reveal anything that identifies you.
>
> You can use HTTPS/SSL/etc for end-to-end privacy. That's what it was
> designed for. The encrypted connecting is established and maintained
> between you and the specific site you're doing business with. It's a
> very robust channel when used properly. The keys to using it properly
> are using modern software and paying attention to what's on your screen.
Which is where this entire argument pro-Tor falls apart operationally.
Joan Battawhatever is the perfect example. She *may* get this right but
look at the number of days this thread has circled? She's still in a
plane with no ****ing landing strip in sight. And what is she? .0001% of
the using population? See any other noobs wading through these bull****
theoretical, operationally inconsequential blabberings?
Nope, there is *no* safety, security or anonymity for the vast majority
of the user population and I doubt there ever will be.
Conclusion:
How safe is Tor for logging into http (non https) web sites?
As aafe as your expertise.
How safe is Tor for logging into http (non https) web sites *in a real
world, User population.
Unsafe.
--
"You can't trust code that you did not totally create yourself"
Ken Thompson "Reflections on Trusting Trust"
http://www.acm.org/classics/sep95/


Reply With Quote