Blog Tips
Simply click on the URL (http:// ...) link in each article to visit the article's page
To search this blog, try the Search Box on the right, or click on the Labels following each post entry
To search this blog, try the Search Box on the right, or click on the Labels following each post entry
19 November, 2015
To hackers, spies, and cyber-criminals these days, calling Tor “secure” is a bit laughable. There are so many exploits and workarounds, along with unavoidable weaknesses to side-channel attacks performed in the physical world, that in some cases the false sense of cyber-security can end up making relaxed use of Tor less secure than paranoid use of the regular internet.
Labels:
Cybersafety,
ICT Capability,
Privacy