1. 8
  1.  

  2. 3

    It’s hardly news that the NSA is focusing on Tor, but I was a bit surprised (or maybe just disappointed at this leak) that they don’t have more concrete methods of de-anonymizing Tor traffic.

    The recent Silk Road bust shows that most baddies that get caught after using Tor still do so because they screw up outside of Tor (like mailing fake passports to your home address).

    1. 2

      Oh, Bruce Schneier’s article has more technical details of how this works.

    2. 1

      Here is the NSA’s 49-page report (pdf) on the technical aspects of Tor and trying to break it.