AW: Genode Tails?

Wolfgang Schmidt w_schmidt at ...181...
Mon Jun 15 06:52:56 CEST 2015


Tor is not secure.  Neither is genode. If You wan't security disconnect all devices from network, only usw them in rooms without windows.

If You habe enough nodes you Can easily deanomize users. This was done most part of last year as the Tor team announced that nodes where removed. Also you cannot say if other nodes are contaminated. 

In genode you can use the fact that there are a dort of shared components to send messages between programs without really having any token for a communication between them.

Tor could just be another software to create an additional security hole.

Where there is a software there are bugs, workarounds etc.pp.



----- Ursprüngliche Nachricht -----
Von: "Nobody III" <hungryninja101 at ...9...>
Gesendet: ‎15.‎06.‎2015 00:41
An: "Genode OS Framework Mailing List" <genode-main at lists.sourceforge.net>
Betreff: Genode Tails?

Tor, an anonymity network, is used to get around NSA spying and the like.
Unfortunately, The NSA has been using a workaround: hack the computers that
try using Tor by exploiting vulnerabilities in Tor Browser, a slightly
modified version of Firefox. Tails is a Linux distribution that uses Tor
for all its network communications. It seems like Genode would be
better-suited for protecting anonymity than Tails. A Tails equivalent seems
like a very useful, relatively simple yet incredibly practical use of
Genode. Anyone else want to pursue this? Also, how secure is the current
Arora browser on Genode?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.genode.org/pipermail/users/attachments/20150615/6aa391c8/attachment.html>


More information about the users mailing list