Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What do you mean the FBI's NIT used basically the same thing? Do you have a source?


What I mean is that it pwns users by bypassing Tor, and reporting their ISP-assigned IP addresses. I'm not arguing that the methods for doing that are similar.

[edited for coherence]




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: