Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I find it somewhat amusing that he's at least somewhat likely to use Tor, which was developed by the US Naval Research Laboratory.


Actually that would be a good question to ask him.

Him intimately knowing about how NSA does stuff, what would be his suggestion of ensuring anonymity. What steps should one take, what tools should one use, etc. His answers on this would be very telling. Someone please ask him that!




That would be also my question to him. How secure is Tor? How many Tor nodes has NSA for timing analysis?


My question: How secure is I2P and why did you choose Tor over it?

If not Tor or I2P, what steps would you have taken? What other measures can you publicly reveal you are using/have used in the process of securing yourself?

How do you recommend those technologically able protect themselves, along with the general public?




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: