Comment not trying to be an impostor (Score 1) 135
i said this in another comment:
i'm not saying anyone with a CCNA can hack Tor
i'm saying that anything that exists that can be transmitted and decoded can also be accessed by a third party
if it exists, it's not "secure"
maybe my analogy is awkward, but it's valid and accurate
what i'm really trying to say is, if you can access it, so can someone else