[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <21568.1190041158@turing-police.cc.vt.edu>
Date: Mon, 17 Sep 2007 10:59:18 -0400
From: Valdis.Kletnieks@...edu
To: Throwaway1@...umbus.rr.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Google Tracking
On Sat, 15 Sep 2007 09:49:45 EDT, "Throwaway1@...umbus.rr.com" said:
> Maybe there are things I do that I'd prefer to keep secret. Maybe there
> aren't. If there were, maybe I would try to protect ONLY those very few
> high priority items. For the rest, I'd do nothing to hide anything.
Of course, taking it a bit further, remember that the best reason for using
crypto for *everything*, important or not, is because if you only encrypt
the important 10%, that tells the opponent 2 things:
1) They can disregard the other 90%.
2) Even though they can't read the other 10%, they can apply traffic analysis
to it, and see where that 10% was going.
If you encrypt everything, they have to apply traffic analysis to everything,
and chase a lot of dead ends.
If you only tunnel *some* stuff through TOR, they know you have something
you consider important. If you tunnel it *all* through TOR, they can't
tell what's important and what's not.
Whether tunneling it *all* through TOR gets you onto a "watch list of people
who are known to be trying to play with our heads" is a different question ;)
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists