Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If wikileaks can snoop tor nodes to get its first data release than that is in fact a trojan horse..no imagination required..


As I understood it, some of the guys who leaked material for Wikileaks did so by using Tor normally, like would a Chinese journalist. Wikileaks doesn't need to crack or misuse Tor in any way to receive leaks through it.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: