For a variety of reasons that's actually not the dig you think it was. 1) This post-dates Snowden, obviously 2) I was going to report this out at The Intercept but for completely unrelated reasons you simply couldn't address did not
-
-
The fact that they were aware of this loophole and kept touting Tor anyway raises a host of questions for me. I didn't think that segment of your piece was a "dig." The "dig" was all mine. Still, kudos for being the only reporter to nail that story, and for your post today.
1 reply 0 retweets 4 likes -
What evidence do you have about when "they" became aware of the loophole? I'm not sure you understand the nature of the loophole, bc it's not BRANDED to Tor, in any way.
1 reply 0 retweets 2 likes -
I think I do - I read your stuff - I know they read it too. They would have been aware the same time your story came out. It explained the loophole quite clearly. Why would anybody actively promoting Tor not report its users might be vulnerable?
1 reply 1 retweet 6 likes -
So you suggest that users use NO traffic obscuring tools?
2 replies 0 retweets 1 like -
Look, I'm not going to give advice. If people want to use a system that's largely funded by the Pentagon & USG through cutouts that include NSA sigint contractors, and has been identified as vulnerable to NSA probing, that's their choice. Mark me down as highly skeptical.
1 reply 1 retweet 8 likes -
So in other words you're backing the products that FBI can get with a relevance standard, just to make a political point. Gotcha.
3 replies 0 retweets 1 like -
Marcy you are incredibly arrogant and petty when you get annoyed. What you just said is garbage. I'm not backing any "products." That's what The Intercept does. And you, apparently. I'm a journalist, not some techno-hawker. Bye.
3 replies 1 retweet 12 likes -
Replying to @TimothyS @yashalevine and
I'm not a fan of marcy's but I thought the vulnerability/0day which allowed NSA to identify toe users was actually in Mozilla Firefox
1 reply 0 retweets 0 likes -
Replying to @Pill_crystal @TimothyS and
Correct. Moreover, the 2014 exception applies to both VPN and Tor, AFAIK. Meaning to choose between a VPN and Tor you're still looking at: 1) Easy LE subpoenas of VPNs but not Tor 2) Other known privacy problems w/shittier VPNs
1 reply 0 retweets 0 likes
So to oppose Tor, but not VPNs, based on 2014 exception is BY DEFINITION advocating a product that has two further privacy problems.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.