![]() ![]() Recently, I ran a "hostile" exit node and recorded the encryption negotiated by incoming connections (the external link encryption, not the internal circuits). Only 10% of the servers have upgraded to version 2.4. ![]() You can see this for yourself by going to a live listing of Tor servers, like. The older 2.3 versions of Tor uses keys the NSA can crack, but few have upgraded to the newer 2.4 version with better keys. The problem with Tor is that it still uses these 1024 bit keys for much of its crypto, particularly because most people are still using older versions of the software. We know the NSA builds custom chips, they've got fairly public deals with IBM foundries to build chips. Assuming no "breakthroughs", the NSA can spend $1 billion on custom chips that can break such a key in a few hours. But everyone seems to agree that if anything, the NSA can break 1024 RSA/DH keys. After more revelations, and expert analysis, we still aren't precisely sure what crypto the NSA can break. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |