Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

OMG! The government created something useful therefore it can only, fundamentally, be a trojan horse. While I'm sure there could be some crackers out there trying to insert bad code. I also believe these things tend not to stick around for long. Especially when blame says "Hey, I've inserted code here, here and here. Try not to read me too closely."

I've tried Tor in the past and I stopped because:

* It's really slow.

* It's the chatroulette of really questionnable material. You stumble into some shit and think WTF?!

* The amount of traffic it generated caused my shitty router to slow down significantly or crash completely.




If wikileaks can snoop tor nodes to get its first data release than that is in fact a trojan horse..no imagination required..


As I understood it, some of the guys who leaked material for Wikileaks did so by using Tor normally, like would a Chinese journalist. Wikileaks doesn't need to crack or misuse Tor in any way to receive leaks through it.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: