With the recent allegations of monitoring of @[email protected] entry nodes being monitored by #German agencies to identify users by "timing analyzes" (https://www.tagesschau.de/investigativ/panorama/tor-netzwerk-100.html), I've been thinking about protections against this sort of attack if it proved to be feasible. The best protections would obviously be more entry nodes and rejection of mass internet surveillance, but as a second-best/intermediate solution, would a #Tor-powered OS like @[email protected] or #Tails be a solution? My reasoning is that the OSes connect to the entry node independent of when the browser or other applications connect.
#Privacy #security #CyberSecurity #surveillance