Unsourced claims like this do absolutely no good to anyone, ever. Which means that either right before typing this comment, you though to yourself “time to be a bad person for no good reason” or you’re a shill for some surveillance agency with an interest in scaring people away from privacy enhancing solutions.
Well, it is a little weird that Tor was originally a military technology funded by the US Department of Defense. Also, privacy in these days is really hard to achieve.
Yes. In order to launder your dirty traffic, you need to mix it with lots of other traffic. And you need it to be safe to avoid attribution.
The US military (and various 3-letter agencies) needs the service to be secure, provide strong anonymity, and to include a sea of traffic thats mostly not their own
OP is a conspiracy nut who doesn’t understand cryptography, know how to read C code, or know how to differentiate experts in these things from misinformation about these things.
Tor and Tails merge to support western intelligence
Unsourced claims like this do absolutely no good to anyone, ever. Which means that either right before typing this comment, you though to yourself “time to be a bad person for no good reason” or you’re a shill for some surveillance agency with an interest in scaring people away from privacy enhancing solutions.
Well, it is a little weird that Tor was originally a military technology funded by the US Department of Defense. Also, privacy in these days is really hard to achieve.
Not at all, if you understand why they created it and how they use it
The point of making of open to everyone was so they’d have other traffic to hide their own secret communications amongst, right?
Yes. In order to launder your dirty traffic, you need to mix it with lots of other traffic. And you need it to be safe to avoid attribution.
The US military (and various 3-letter agencies) needs the service to be secure, provide strong anonymity, and to include a sea of traffic thats mostly not their own
Which is exactly why claims like this should be backed with evidence.
Please explain
OP is a conspiracy nut who doesn’t understand cryptography, know how to read C code, or know how to differentiate experts in these things from misinformation about these things.
I know I just felt like poking the bear. If nothing else I might somehow learn something new.
Just look at the domain