Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Also, the paranoid in me (and probably more significantly, the keyboard-activist-in-the-safety-of-my-parents-basement) suggests that it might be wise to access keyservers over TOR.

If _I_ were involved with PRISM, the pipe running to pgp.mit.edu would be one of the most monitored connections around. "Hmmm, someone just searched for a PGP key for FedRegister - lets see what else that IP address has searched for, and what's in all the gmail inboxes that have ever been accessed using that IP address…"



Yes. This is the way that hackers should be thinking from now on.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: