Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Officials learn terrorist and criminals use cas (Score 1) 411

You only need to do that here (Sweden) if you want to deposit large enough sums, I don't know exactly how much should be a couple of thousands of your so-called quids.

I expect this to gradually change within the next 10 years or so, though. I mean, handling cash in this day is suspicious enough when you might as well use a debit or credit card of some sorts, or pay with your phone bill.

Comment Re:Officials learn terrorist and criminals use cas (Score 3, Interesting) 411

Actually, a better "analogy" is that they work hard on making sure that cash can't be used anonymously. Each transaction must be monitored (serial numbers on every bill, cameras in every ATM and store), and controlled (demanding proof of ownership for depositing cash at a bank, removing the possibility to actually use cash for buying travel documents).

Much like they are working hard on trying to make sure Tor can't be used anonymously.

Comment Re:duh.. (Score 1) 234

I'm just judging the book by its cover. It looks like it's design to lure people with flashy but cheap looking animations.

Anyway, changing your browser string won't make you less trackable. They don't use those for tracking individual users.

Comment Re:a related question (Score 1) 234

He did claim early on that he did this because he didn't want any personal information about any NSA agents getting out, and I bet the papers are full of them.

It is, however, a pretty lame excuse IMHO. But I'm not the one with a government agency after me.

Comment Re:How about the nodes (Score 5, Interesting) 234

Interesting. If I worked for NSA, I would try to. It would give some more information. Though on the other hand, they may just as well run their own nodes to get that information (oh yes, they do this already), and hacking 'normal' people just for the lulz always increases the chance of information about your operations getting out.

In short: It would be stupid to hack you just because you're running a node, unless you're their target in some other way.

Comment Re:Ehhh... (Score 1) 234

I think it's because Snowden didn't release it all, like Manning, but just released a small part of it, and only to a newspaper. He claimed to have his reasons for this, not that I agree with them. Something about how the Manning files identified some people, and that Snowden didn't want that to happen.

Comment Re:Dichotomy (Score 1) 234

Of course they are watching exit nodes. Everybody should assume they do (also the person running the node will watch, and that person's ISP).

However, I have never heard anyone claiming they can tie the traffic back by watching the traffic, other by the well know timing attacks that they *do* talk about in the article. Basically, they see some traffic exit the node at the same time as they see similar traffic at some completely unrelated place in the network, building up statistics which can identify a suspect over time. This is why they say they have limited success.

Slashdot Top Deals

"Don't drop acid, take it pass-fail!" -- Bryan Michael Wendt

Working...