Tor is not secure. Neither is genode. If You wan't security disconnect all devices from network, only usw them in rooms without windows.
If You habe enough nodes you Can easily deanomize users. This was done most part of last year as the Tor team announced that nodes where removed. Also you cannot say if other nodes are contaminated.
In genode you can use the fact that there are a dort of shared components to send messages between programs without really having any token for a communication between them.
Tor could just be another software to create an additional security hole.
Where there is a software there are bugs, workarounds etc.pp.
----- Ursprüngliche Nachricht ----- Von: "Nobody III" <hungryninja101@...9...> Gesendet: 15.06.2015 00:41 An: "Genode OS Framework Mailing List" genode-main@lists.sourceforge.net Betreff: Genode Tails?
Tor, an anonymity network, is used to get around NSA spying and the like. Unfortunately, The NSA has been using a workaround: hack the computers that try using Tor by exploiting vulnerabilities in Tor Browser, a slightly modified version of Firefox. Tails is a Linux distribution that uses Tor for all its network communications. It seems like Genode would be better-suited for protecting anonymity than Tails. A Tails equivalent seems like a very useful, relatively simple yet incredibly practical use of Genode. Anyone else want to pursue this? Also, how secure is the current Arora browser on Genode?