<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_10_25_1316233</id>
	<title>Anonymous Browsing On Android Phones Using Tor</title>
	<author>Soulskill</author>
	<datestamp>1256481780000</datestamp>
	<htmltext>ruphus13 writes <i>"Privacy is becoming a scarce commodity, especially with geo-aware phones.  Now, Android phone users can <a href="http://ostatic.com/blog/browse-anonymously-on-your-android-phone-with-tor">browse anonymously using Tor</a> &mdash; a capability, until now, limited to the desktop.  From the post: 'We have successfully ported the native C Tor app to Android and built an Android application bundle that installs, runs and provides the glue needed to make it useful to end users. Secure, <a href="http://openideals.com/2009/10/22/orbot-proxy/">anonymous access to the web</a> via Tor on Android is now a reality,' writes Guardian Project team member Nathan Freitas.  The Tor 0.2.2.6-alpha release uses toolchain wrapper scripts to run Tor without requiring root access."</i></htmltext>
<tokenext>ruphus13 writes " Privacy is becoming a scarce commodity , especially with geo-aware phones .
Now , Android phone users can browse anonymously using Tor    a capability , until now , limited to the desktop .
From the post : 'We have successfully ported the native C Tor app to Android and built an Android application bundle that installs , runs and provides the glue needed to make it useful to end users .
Secure , anonymous access to the web via Tor on Android is now a reality, ' writes Guardian Project team member Nathan Freitas .
The Tor 0.2.2.6-alpha release uses toolchain wrapper scripts to run Tor without requiring root access .
"</tokentext>
<sentencetext>ruphus13 writes "Privacy is becoming a scarce commodity, especially with geo-aware phones.
Now, Android phone users can browse anonymously using Tor — a capability, until now, limited to the desktop.
From the post: 'We have successfully ported the native C Tor app to Android and built an Android application bundle that installs, runs and provides the glue needed to make it useful to end users.
Secure, anonymous access to the web via Tor on Android is now a reality,' writes Guardian Project team member Nathan Freitas.
The Tor 0.2.2.6-alpha release uses toolchain wrapper scripts to run Tor without requiring root access.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864821</id>
	<title>Re:!secure</title>
	<author>tolan-b</author>
	<datestamp>1256488500000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>&gt; or if you're using https or other secure<br>&gt; connection, change the certificates.</p><p>Am I missing something here? I know about Tor MITM attacks from exit nodes, but how are they supposed to fake a cert? Seeing as proper certificates 'guarantee' identity as well as encryption.</p><p>Assuming they're not using that null in the name string attack. But let's assume they're using a secure browser to begin with<nobr> <wbr></nobr>:)</p></htmltext>
<tokenext>&gt; or if you 're using https or other secure &gt; connection , change the certificates.Am I missing something here ?
I know about Tor MITM attacks from exit nodes , but how are they supposed to fake a cert ?
Seeing as proper certificates 'guarantee ' identity as well as encryption.Assuming they 're not using that null in the name string attack .
But let 's assume they 're using a secure browser to begin with : )</tokentext>
<sentencetext>&gt; or if you're using https or other secure&gt; connection, change the certificates.Am I missing something here?
I know about Tor MITM attacks from exit nodes, but how are they supposed to fake a cert?
Seeing as proper certificates 'guarantee' identity as well as encryption.Assuming they're not using that null in the name string attack.
But let's assume they're using a secure browser to begin with :)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866727</id>
	<title>Tor is useless</title>
	<author>harmonise</author>
	<datestamp>1256504220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Tor is useless. It's a neat idea but doesn't work in practice due to bandwidth problems. Every time I have tried it, connections almost always time out without receiving data. The few times I do receive data it can take minutes for a web page to appear, say nothing of the images which would still need to load.</p></htmltext>
<tokenext>Tor is useless .
It 's a neat idea but does n't work in practice due to bandwidth problems .
Every time I have tried it , connections almost always time out without receiving data .
The few times I do receive data it can take minutes for a web page to appear , say nothing of the images which would still need to load .</tokentext>
<sentencetext>Tor is useless.
It's a neat idea but doesn't work in practice due to bandwidth problems.
Every time I have tried it, connections almost always time out without receiving data.
The few times I do receive data it can take minutes for a web page to appear, say nothing of the images which would still need to load.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864573</id>
	<title>Tor-bots and Tor-jans.....</title>
	<author>Anonymous</author>
	<datestamp>1256485920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>....respect your anonymity while making you feel so much more secure... just like car alarms, free buffets in Vegas, and condoms.</htmltext>
<tokenext>....respect your anonymity while making you feel so much more secure... just like car alarms , free buffets in Vegas , and condoms .</tokentext>
<sentencetext>....respect your anonymity while making you feel so much more secure... just like car alarms, free buffets in Vegas, and condoms.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864651</id>
	<title>security is a many splendored thing</title>
	<author>Anonymous</author>
	<datestamp>1256486820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It isn't that TOR is insecure.  It is that TOR provides limited protection against adversaries.  End users need to understand those limits and work within them.</p></htmltext>
<tokenext>It is n't that TOR is insecure .
It is that TOR provides limited protection against adversaries .
End users need to understand those limits and work within them .</tokentext>
<sentencetext>It isn't that TOR is insecure.
It is that TOR provides limited protection against adversaries.
End users need to understand those limits and work within them.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864607</id>
	<title>Re:!secure</title>
	<author>SlothDead</author>
	<datestamp>1256486400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I'm not sure I understand this. How is monitoring an exit node different from monitoring any node on the internet? Can't I just intercept usernames and passwords at any node? Or are you saying that TOR exit nodes are just a more popular target, because they route more? I'm puzzled by what you are saying.<nobr> <wbr></nobr>:-/</htmltext>
<tokenext>I 'm not sure I understand this .
How is monitoring an exit node different from monitoring any node on the internet ?
Ca n't I just intercept usernames and passwords at any node ?
Or are you saying that TOR exit nodes are just a more popular target , because they route more ?
I 'm puzzled by what you are saying .
: -/</tokentext>
<sentencetext>I'm not sure I understand this.
How is monitoring an exit node different from monitoring any node on the internet?
Can't I just intercept usernames and passwords at any node?
Or are you saying that TOR exit nodes are just a more popular target, because they route more?
I'm puzzled by what you are saying.
:-/</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865395</id>
	<title>Why not use VPN to maintain the speed?</title>
	<author>lisany</author>
	<datestamp>1256494320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>As an iPhone user I prefer just using the built-in L2TP over IPSec. Surely the android phones can do the same thing.</htmltext>
<tokenext>As an iPhone user I prefer just using the built-in L2TP over IPSec .
Surely the android phones can do the same thing .</tokentext>
<sentencetext>As an iPhone user I prefer just using the built-in L2TP over IPSec.
Surely the android phones can do the same thing.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866061</id>
	<title>Re:Except you must still trust Tor</title>
	<author>TheRaven64</author>
	<datestamp>1256498940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>No, use end-to-end encryption with either pre-shared keys or keys signed by a mutually trusted party in addition to Tor.  Don't just use Tor by itself and expect it all to be happy and magic.</htmltext>
<tokenext>No , use end-to-end encryption with either pre-shared keys or keys signed by a mutually trusted party in addition to Tor .
Do n't just use Tor by itself and expect it all to be happy and magic .</tokentext>
<sentencetext>No, use end-to-end encryption with either pre-shared keys or keys signed by a mutually trusted party in addition to Tor.
Don't just use Tor by itself and expect it all to be happy and magic.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867101</id>
	<title>Re:Except you must still trust Tor</title>
	<author>arevos</author>
	<datestamp>1256464740000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>You must still assume that the Tor nodes you are using are not hacked NSA or Chinese intelligence agency nodes, with a nice 'log traffic to disk' function added.</p></div><p>Tor is a service for browsing anonymously, not securely. Security is handled by SSL.</p></div>
	</htmltext>
<tokenext>You must still assume that the Tor nodes you are using are not hacked NSA or Chinese intelligence agency nodes , with a nice 'log traffic to disk ' function added.Tor is a service for browsing anonymously , not securely .
Security is handled by SSL .</tokentext>
<sentencetext>You must still assume that the Tor nodes you are using are not hacked NSA or Chinese intelligence agency nodes, with a nice 'log traffic to disk' function added.Tor is a service for browsing anonymously, not securely.
Security is handled by SSL.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867177</id>
	<title>Re:!secure</title>
	<author>Anonymous</author>
	<datestamp>1256465820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>fuck man i just divided by zero<br>OH SHI---</p></htmltext>
<tokenext>fuck man i just divided by zeroOH SHI---</tokentext>
<sentencetext>fuck man i just divided by zeroOH SHI---</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29869121</id>
	<title>Tor for iPhone</title>
	<author>dUN82</author>
	<datestamp>1256492880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>May we have an iphone version of it plz...</htmltext>
<tokenext>May we have an iphone version of it plz.. .</tokentext>
<sentencetext>May we have an iphone version of it plz...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867649</id>
	<title>Re:Except you must still trust Tor</title>
	<author>AHuxley</author>
	<datestamp>1256472180000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext> not hacked NSA?<br>
The NSA could set up front companies ie telcos or cut out political rights groups, students, uni profs boxes and just connect the dots in the USA.<br> As the NSA is every telco, ips in the USA, getting a entry IP and tracing back to the exit ect. is not hard with their budget.<br> As the NSA now faces inward, TOR in the USA is now another fun computer project at best.<br>
Sneaker net people or meet and greet with an understanding of one-time pads<nobr> <wbr></nobr>:)</htmltext>
<tokenext>not hacked NSA ?
The NSA could set up front companies ie telcos or cut out political rights groups , students , uni profs boxes and just connect the dots in the USA .
As the NSA is every telco , ips in the USA , getting a entry IP and tracing back to the exit ect .
is not hard with their budget .
As the NSA now faces inward , TOR in the USA is now another fun computer project at best .
Sneaker net people or meet and greet with an understanding of one-time pads : )</tokentext>
<sentencetext> not hacked NSA?
The NSA could set up front companies ie telcos or cut out political rights groups, students, uni profs boxes and just connect the dots in the USA.
As the NSA is every telco, ips in the USA, getting a entry IP and tracing back to the exit ect.
is not hard with their budget.
As the NSA now faces inward, TOR in the USA is now another fun computer project at best.
Sneaker net people or meet and greet with an understanding of one-time pads :)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29868535</id>
	<title>Re:Out of web paper ?</title>
	<author>ethan0</author>
	<datestamp>1256483700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>good question. as far as I can tell:</p><p>- story about tor on android goes up at <a href="http://yro.slashdot.org/story/09/10/26/0130200/Anonymous-Browsing-On-Android-Phones-Using-Tor" title="slashdot.org" rel="nofollow">http://yro.slashdot.org/story/09/10/26/0130200/Anonymous-Browsing-On-Android-Phones-Using-Tor</a> [slashdot.org]<br>- story about tor disappears - that url gives "The item you're trying to view either does not exist, or is not viewable to you."<br>- story about at&amp;t congestion shows up at <a href="http://mobile.slashdot.org/story/09/10/25/1316233/A-Possible-Cause-of-ATampTs-Wireless-Clog-mdash-Configuration-Errors" title="slashdot.org" rel="nofollow">http://mobile.slashdot.org/story/09/10/25/1316233/A-Possible-Cause-of-ATampTs-Wireless-Clog-mdash-Configuration-Errors</a> [slashdot.org]<br>- comments from tor story are on at&amp;t story<br>- a few minutes later, the tor story reappears at the url of the at&amp;t story, but now in the mobile section instead of yro. at&amp;t content disappears from that url.<br>- at&amp;t story appears as a new story at <a href="http://mobile.slashdot.org/story/09/10/26/0152214/A-Possible-Cause-of-ATampTs-Wireless-Clog-mdash-Configuration-Errors" title="slashdot.org" rel="nofollow">http://mobile.slashdot.org/story/09/10/26/0152214/A-Possible-Cause-of-ATampTs-Wireless-Clog-mdash-Configuration-Errors</a> [slashdot.org]</p><p>weird.</p></htmltext>
<tokenext>good question .
as far as I can tell : - story about tor on android goes up at http : //yro.slashdot.org/story/09/10/26/0130200/Anonymous-Browsing-On-Android-Phones-Using-Tor [ slashdot.org ] - story about tor disappears - that url gives " The item you 're trying to view either does not exist , or is not viewable to you .
" - story about at&amp;t congestion shows up at http : //mobile.slashdot.org/story/09/10/25/1316233/A-Possible-Cause-of-ATampTs-Wireless-Clog-mdash-Configuration-Errors [ slashdot.org ] - comments from tor story are on at&amp;t story- a few minutes later , the tor story reappears at the url of the at&amp;t story , but now in the mobile section instead of yro .
at&amp;t content disappears from that url.- at&amp;t story appears as a new story at http : //mobile.slashdot.org/story/09/10/26/0152214/A-Possible-Cause-of-ATampTs-Wireless-Clog-mdash-Configuration-Errors [ slashdot.org ] weird .</tokentext>
<sentencetext>good question.
as far as I can tell:- story about tor on android goes up at http://yro.slashdot.org/story/09/10/26/0130200/Anonymous-Browsing-On-Android-Phones-Using-Tor [slashdot.org]- story about tor disappears - that url gives "The item you're trying to view either does not exist, or is not viewable to you.
"- story about at&amp;t congestion shows up at http://mobile.slashdot.org/story/09/10/25/1316233/A-Possible-Cause-of-ATampTs-Wireless-Clog-mdash-Configuration-Errors [slashdot.org]- comments from tor story are on at&amp;t story- a few minutes later, the tor story reappears at the url of the at&amp;t story, but now in the mobile section instead of yro.
at&amp;t content disappears from that url.- at&amp;t story appears as a new story at http://mobile.slashdot.org/story/09/10/26/0152214/A-Possible-Cause-of-ATampTs-Wireless-Clog-mdash-Configuration-Errors [slashdot.org]weird.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29868443</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29868443</id>
	<title>Out of web paper ?</title>
	<author>dbcad7</author>
	<datestamp>1256482680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>What the heck happend here ?<nobr> <wbr></nobr>.. there was a story on Tor, and then a story about AT&amp;T and somehow the Tor replies are in here ?</htmltext>
<tokenext>What the heck happend here ?
.. there was a story on Tor , and then a story about AT&amp;T and somehow the Tor replies are in here ?</tokentext>
<sentencetext>What the heck happend here ?
.. there was a story on Tor, and then a story about AT&amp;T and somehow the Tor replies are in here ?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867433</id>
	<title>Not even anonymous in some situations!</title>
	<author>renoX</author>
	<datestamp>1256468940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>&gt;&gt;Secure, anonymous access to the web via Tor on Android is now a reality<br>&gt;<br>&gt;People should really stop using the word secure with Tor. Anonymous, sure</p><p>Not even anonymous in some situations!<br>Let's think about China: they control the network so they can easily know *who* is using Tor (by monitor Tor's access gateways) and even though they don't know what you're doing with Tor, they know that you're trying to bypass the filtering..<br>Now it depends on the number of Tor users, if they are numerous, you're safe, otherwise using Tor, you risk to draw government's attention to you: it's not a very good kind of anonymity..</p></htmltext>
<tokenext>&gt; &gt; Secure , anonymous access to the web via Tor on Android is now a reality &gt; &gt; People should really stop using the word secure with Tor .
Anonymous , sureNot even anonymous in some situations ! Let 's think about China : they control the network so they can easily know * who * is using Tor ( by monitor Tor 's access gateways ) and even though they do n't know what you 're doing with Tor , they know that you 're trying to bypass the filtering..Now it depends on the number of Tor users , if they are numerous , you 're safe , otherwise using Tor , you risk to draw government 's attention to you : it 's not a very good kind of anonymity. .</tokentext>
<sentencetext>&gt;&gt;Secure, anonymous access to the web via Tor on Android is now a reality&gt;&gt;People should really stop using the word secure with Tor.
Anonymous, sureNot even anonymous in some situations!Let's think about China: they control the network so they can easily know *who* is using Tor (by monitor Tor's access gateways) and even though they don't know what you're doing with Tor, they know that you're trying to bypass the filtering..Now it depends on the number of Tor users, if they are numerous, you're safe, otherwise using Tor, you risk to draw government's attention to you: it's not a very good kind of anonymity..</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865059</id>
	<title>Re:Privacy is the next killer ap</title>
	<author>Arancaytar</author>
	<datestamp>1256490960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>In most of the "cool gadgets" cases, the problem is a security/convenience trade-off. You wouldn't be using them for entertainment if they were inconvenient enough to guarantee privacy.</p><p>However, in other respects you have a point - political dissenters are still using Facebook and Twitter to organize (eg. in Iran), and these users have to be provided either with a secure if inconvenient way to use them, or with a better (if inconvenient) alternative.</p></htmltext>
<tokenext>In most of the " cool gadgets " cases , the problem is a security/convenience trade-off .
You would n't be using them for entertainment if they were inconvenient enough to guarantee privacy.However , in other respects you have a point - political dissenters are still using Facebook and Twitter to organize ( eg .
in Iran ) , and these users have to be provided either with a secure if inconvenient way to use them , or with a better ( if inconvenient ) alternative .</tokentext>
<sentencetext>In most of the "cool gadgets" cases, the problem is a security/convenience trade-off.
You wouldn't be using them for entertainment if they were inconvenient enough to guarantee privacy.However, in other respects you have a point - political dissenters are still using Facebook and Twitter to organize (eg.
in Iran), and these users have to be provided either with a secure if inconvenient way to use them, or with a better (if inconvenient) alternative.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864539</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864539</id>
	<title>Privacy is the next killer ap</title>
	<author>Anonymous</author>
	<datestamp>1256485500000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>The company who figures out how to protect our privacy while using all the cool gadgets and online tools is going to make a boat load of money.</htmltext>
<tokenext>The company who figures out how to protect our privacy while using all the cool gadgets and online tools is going to make a boat load of money .</tokentext>
<sentencetext>The company who figures out how to protect our privacy while using all the cool gadgets and online tools is going to make a boat load of money.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</id>
	<title>!secure</title>
	<author>Anonymous</author>
	<datestamp>1256485380000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p><div class="quote"><p>Secure, anonymous access to the web via Tor on Android is now a reality</p></div><p>People should really stop using the word secure with Tor. Anonymous, sure, but you actually forfeit some of your security and privacy when using Tor. Anyone can snoop your outgoing connections from Exit node, or if you're using https or other secure connection, change the certificates. On top of that there's a change the exit node changes your http pages in addition to stealing or just snooping for information. Implying "secure" in news likes this gives lots of false sense of security to users, like has been seen many times before.</p><p><div class="quote"><p> <b>Eavesdropping by exit nodes</b></p><p>In September 2007, Dan Egerstad, a Swedish security consultant, revealed that by operating and monitoring Tor exit nodes he had intercepted usernames and passwords for a large number of email accounts.<a href="http://www.wired.com/politics/security/news/2007/09/embassy\_hacks?currentPage=1" title="wired.com">[15]</a> [wired.com] As Tor does not, and by design cannot, encrypt the traffic between an exit node and the target server, any exit node is in a position to capture any traffic passing through it which does not use end-to-end encryption, e.g. SSL. While this does not inherently violate the anonymity of the source, it affords added opportunities for data interception by self-selected third parties, greatly increasing the risk of exposure of sensitive data by users who are careless or who mistake Tor's anonymity for security.<a href="http://www.securityfocus.com/news/11447" title="securityfocus.com">[16]</a> [securityfocus.com]</p> </div><p>Another thing is that you are still usually leaking DNS queries to your ISP, which may even return false results if you're being censored in China or something and they still see what sites you're visiting.</p><p>The summary also quickly mentions geo-aware phones. If you happen to be using that bad exit node, now your geo-location updates will be transmitted via it too. And goverments should be able to set up a lot different exit nodes all around the world easily.</p><p>So no, it's not secure. It's maybe anonymous, if you use it correctly and don't login to your banking, slashdot account or whatever with it.</p></div>
	</htmltext>
<tokenext>Secure , anonymous access to the web via Tor on Android is now a realityPeople should really stop using the word secure with Tor .
Anonymous , sure , but you actually forfeit some of your security and privacy when using Tor .
Anyone can snoop your outgoing connections from Exit node , or if you 're using https or other secure connection , change the certificates .
On top of that there 's a change the exit node changes your http pages in addition to stealing or just snooping for information .
Implying " secure " in news likes this gives lots of false sense of security to users , like has been seen many times before .
Eavesdropping by exit nodesIn September 2007 , Dan Egerstad , a Swedish security consultant , revealed that by operating and monitoring Tor exit nodes he had intercepted usernames and passwords for a large number of email accounts .
[ 15 ] [ wired.com ] As Tor does not , and by design can not , encrypt the traffic between an exit node and the target server , any exit node is in a position to capture any traffic passing through it which does not use end-to-end encryption , e.g .
SSL. While this does not inherently violate the anonymity of the source , it affords added opportunities for data interception by self-selected third parties , greatly increasing the risk of exposure of sensitive data by users who are careless or who mistake Tor 's anonymity for security .
[ 16 ] [ securityfocus.com ] Another thing is that you are still usually leaking DNS queries to your ISP , which may even return false results if you 're being censored in China or something and they still see what sites you 're visiting.The summary also quickly mentions geo-aware phones .
If you happen to be using that bad exit node , now your geo-location updates will be transmitted via it too .
And goverments should be able to set up a lot different exit nodes all around the world easily.So no , it 's not secure .
It 's maybe anonymous , if you use it correctly and do n't login to your banking , slashdot account or whatever with it .</tokentext>
<sentencetext>Secure, anonymous access to the web via Tor on Android is now a realityPeople should really stop using the word secure with Tor.
Anonymous, sure, but you actually forfeit some of your security and privacy when using Tor.
Anyone can snoop your outgoing connections from Exit node, or if you're using https or other secure connection, change the certificates.
On top of that there's a change the exit node changes your http pages in addition to stealing or just snooping for information.
Implying "secure" in news likes this gives lots of false sense of security to users, like has been seen many times before.
Eavesdropping by exit nodesIn September 2007, Dan Egerstad, a Swedish security consultant, revealed that by operating and monitoring Tor exit nodes he had intercepted usernames and passwords for a large number of email accounts.
[15] [wired.com] As Tor does not, and by design cannot, encrypt the traffic between an exit node and the target server, any exit node is in a position to capture any traffic passing through it which does not use end-to-end encryption, e.g.
SSL. While this does not inherently violate the anonymity of the source, it affords added opportunities for data interception by self-selected third parties, greatly increasing the risk of exposure of sensitive data by users who are careless or who mistake Tor's anonymity for security.
[16] [securityfocus.com] Another thing is that you are still usually leaking DNS queries to your ISP, which may even return false results if you're being censored in China or something and they still see what sites you're visiting.The summary also quickly mentions geo-aware phones.
If you happen to be using that bad exit node, now your geo-location updates will be transmitted via it too.
And goverments should be able to set up a lot different exit nodes all around the world easily.So no, it's not secure.
It's maybe anonymous, if you use it correctly and don't login to your banking, slashdot account or whatever with it.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864937</id>
	<title>Re:!secure</title>
	<author>Anonymous</author>
	<datestamp>1256489580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I run an exit node, as can anyone. If I were sufficiently nosy, I could use Wireshark et al to listen in.</p><p>It would be impossible to target or identify a specific person due to the randomized infrastructure, but phishing for non-SSL access to random online accounts is very possible.</p><p>That's why you don't want to use Tor to log in anywhere that doesn't use SSL.</p></htmltext>
<tokenext>I run an exit node , as can anyone .
If I were sufficiently nosy , I could use Wireshark et al to listen in.It would be impossible to target or identify a specific person due to the randomized infrastructure , but phishing for non-SSL access to random online accounts is very possible.That 's why you do n't want to use Tor to log in anywhere that does n't use SSL .</tokentext>
<sentencetext>I run an exit node, as can anyone.
If I were sufficiently nosy, I could use Wireshark et al to listen in.It would be impossible to target or identify a specific person due to the randomized infrastructure, but phishing for non-SSL access to random online accounts is very possible.That's why you don't want to use Tor to log in anywhere that doesn't use SSL.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864607</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864881</id>
	<title>Re:!secure</title>
	<author>Arancaytar</author>
	<datestamp>1256489100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Another thing is that you are still usually leaking DNS queries to your ISP, which may even return false results if you're being censored in China or something and they still see what sites you're visiting.</p></div></blockquote><blockquote><div><p>any traffic passing through it which does not use end-to-end encryption, e.g. SSL.</p></div></blockquote><p>Well, like any other security/anonymity tool it only works for users who know their stuff and use it carefully. Don't access sensitive information without end-to-end encryption, and for heaven's sake make sure DNS queries are routed through tor as well (this is possible).</p></div>
	</htmltext>
<tokenext>Another thing is that you are still usually leaking DNS queries to your ISP , which may even return false results if you 're being censored in China or something and they still see what sites you 're visiting.any traffic passing through it which does not use end-to-end encryption , e.g .
SSL.Well , like any other security/anonymity tool it only works for users who know their stuff and use it carefully .
Do n't access sensitive information without end-to-end encryption , and for heaven 's sake make sure DNS queries are routed through tor as well ( this is possible ) .</tokentext>
<sentencetext>Another thing is that you are still usually leaking DNS queries to your ISP, which may even return false results if you're being censored in China or something and they still see what sites you're visiting.any traffic passing through it which does not use end-to-end encryption, e.g.
SSL.Well, like any other security/anonymity tool it only works for users who know their stuff and use it carefully.
Don't access sensitive information without end-to-end encryption, and for heaven's sake make sure DNS queries are routed through tor as well (this is possible).
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866257</id>
	<title>Re:!secure</title>
	<author>56</author>
	<datestamp>1256500140000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>The problem for me is that the actual android phone itself is logged into google! Doesn't that make it insecure by their very nature?<p>
I have an HTC Magic/G2, and I've often been concerned about this when connecting to an open wifi ap. I only use wifi, so the fact that my cell phone company can see my usage over 3g is a non-issue (canceled my data plan when the free trial ran out). But it seems to me that my google password is probably not well protected from whoever owns the ap I'm connecting to.</p><p>
I just downloaded the tor android client and the shadow browser (which tells me that it can't use https, unfortunately), and it seems to work. I just checked my IP and it comes up as somewhere in Vancouver, which is not where I am so that's nice. But I still don't see how one can get past the fact that the phone itself is logged into google at all times.</p></htmltext>
<tokenext>The problem for me is that the actual android phone itself is logged into google !
Does n't that make it insecure by their very nature ?
I have an HTC Magic/G2 , and I 've often been concerned about this when connecting to an open wifi ap .
I only use wifi , so the fact that my cell phone company can see my usage over 3g is a non-issue ( canceled my data plan when the free trial ran out ) .
But it seems to me that my google password is probably not well protected from whoever owns the ap I 'm connecting to .
I just downloaded the tor android client and the shadow browser ( which tells me that it ca n't use https , unfortunately ) , and it seems to work .
I just checked my IP and it comes up as somewhere in Vancouver , which is not where I am so that 's nice .
But I still do n't see how one can get past the fact that the phone itself is logged into google at all times .</tokentext>
<sentencetext>The problem for me is that the actual android phone itself is logged into google!
Doesn't that make it insecure by their very nature?
I have an HTC Magic/G2, and I've often been concerned about this when connecting to an open wifi ap.
I only use wifi, so the fact that my cell phone company can see my usage over 3g is a non-issue (canceled my data plan when the free trial ran out).
But it seems to me that my google password is probably not well protected from whoever owns the ap I'm connecting to.
I just downloaded the tor android client and the shadow browser (which tells me that it can't use https, unfortunately), and it seems to work.
I just checked my IP and it comes up as somewhere in Vancouver, which is not where I am so that's nice.
But I still don't see how one can get past the fact that the phone itself is logged into google at all times.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866733</id>
	<title>Speed</title>
	<author>YourExperiment</author>
	<datestamp>1256504280000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext>Tor is a wonderful piece of software, but browsing with it can be somewhat slow at times. Mobile internet is also a great invention, but can be frustratingly slow. Thank heavens that no-one is proposing using these two technologies in combination!</htmltext>
<tokenext>Tor is a wonderful piece of software , but browsing with it can be somewhat slow at times .
Mobile internet is also a great invention , but can be frustratingly slow .
Thank heavens that no-one is proposing using these two technologies in combination !</tokentext>
<sentencetext>Tor is a wonderful piece of software, but browsing with it can be somewhat slow at times.
Mobile internet is also a great invention, but can be frustratingly slow.
Thank heavens that no-one is proposing using these two technologies in combination!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865899</id>
	<title>Re:Privacy is the next killer ap</title>
	<author>timestride</author>
	<datestamp>1256497800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Are you kidding me?  Perhaps for the<nobr> <wbr></nobr>/. crowd, but what about the average Facebook wielding user?  Almost every "application" on the site states that you are forsaking your own privacy and that of your "friends."  Those requirements don't stop many from agreeing to the terms of use.  The average user doesn't even think of privacy.</htmltext>
<tokenext>Are you kidding me ?
Perhaps for the / .
crowd , but what about the average Facebook wielding user ?
Almost every " application " on the site states that you are forsaking your own privacy and that of your " friends .
" Those requirements do n't stop many from agreeing to the terms of use .
The average user does n't even think of privacy .</tokentext>
<sentencetext>Are you kidding me?
Perhaps for the /.
crowd, but what about the average Facebook wielding user?
Almost every "application" on the site states that you are forsaking your own privacy and that of your "friends.
"  Those requirements don't stop many from agreeing to the terms of use.
The average user doesn't even think of privacy.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864539</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865567</id>
	<title>Re:!secure</title>
	<author>joaobranco</author>
	<datestamp>1256495220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Another thing is that you are still usually leaking DNS queries to your ISP, which may even return false results if you're being censored in China or something and they still see what sites you're visiting.</p></div><p>I believe you don't leak DNS queries if you use tor like a SOCKS proxy (therefore proxying the DNS queries). Although the exit note could mess with your DNS queries if you do so (a hard security trade-off, to be sure).</p></div>
	</htmltext>
<tokenext>Another thing is that you are still usually leaking DNS queries to your ISP , which may even return false results if you 're being censored in China or something and they still see what sites you 're visiting.I believe you do n't leak DNS queries if you use tor like a SOCKS proxy ( therefore proxying the DNS queries ) .
Although the exit note could mess with your DNS queries if you do so ( a hard security trade-off , to be sure ) .</tokentext>
<sentencetext>Another thing is that you are still usually leaking DNS queries to your ISP, which may even return false results if you're being censored in China or something and they still see what sites you're visiting.I believe you don't leak DNS queries if you use tor like a SOCKS proxy (therefore proxying the DNS queries).
Although the exit note could mess with your DNS queries if you do so (a hard security trade-off, to be sure).
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864739</id>
	<title>cell co.s will be thrilled</title>
	<author>quickOnTheUptake</author>
	<datestamp>1256487660000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext>I'm sure cell companies will be thrilled to hear this, with Tor and other onion routing systems using several times the bandwidth of a typical direct connection.</htmltext>
<tokenext>I 'm sure cell companies will be thrilled to hear this , with Tor and other onion routing systems using several times the bandwidth of a typical direct connection .</tokentext>
<sentencetext>I'm sure cell companies will be thrilled to hear this, with Tor and other onion routing systems using several times the bandwidth of a typical direct connection.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865183</id>
	<title>Just in case 3G isn't slow enough already...</title>
	<author>Shag</author>
	<datestamp>1256492040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Wonderful, now we can route our already-pokey 3G connections through a whole bunch of nodes to make them feel like old 2G connections.</p><p>Is retro back in style?</p></htmltext>
<tokenext>Wonderful , now we can route our already-pokey 3G connections through a whole bunch of nodes to make them feel like old 2G connections.Is retro back in style ?</tokentext>
<sentencetext>Wonderful, now we can route our already-pokey 3G connections through a whole bunch of nodes to make them feel like old 2G connections.Is retro back in style?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864877</id>
	<title>Re:!secure</title>
	<author>Anonymous</author>
	<datestamp>1256489040000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>THANK YOU!</p><p>Tor is only secure for doing anonymous things.<br>The instant you login to anything, you are really risking giving up that information and breaking the point of the system in the first place.<br>The creator really needs to put this in as a warning in big red letters.</p></htmltext>
<tokenext>THANK YOU ! Tor is only secure for doing anonymous things.The instant you login to anything , you are really risking giving up that information and breaking the point of the system in the first place.The creator really needs to put this in as a warning in big red letters .</tokentext>
<sentencetext>THANK YOU!Tor is only secure for doing anonymous things.The instant you login to anything, you are really risking giving up that information and breaking the point of the system in the first place.The creator really needs to put this in as a warning in big red letters.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864869</id>
	<title>Use it for .onion only</title>
	<author>zoloto</author>
	<datestamp>1256488980000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>I use TOR mostly for browsing<nobr> <wbr></nobr>.onion sites, inaccessible without it. Also, if you set up your connection/system properly, you *can* browse anonymously. The idea is that your ISP and external website (and exit node) can't identify who you are. This is a VERY good thing. I would, however, not log into any service that could identify me as "me" online through tor. Ever.<br><br>As a personal opinion, many of the<nobr> <wbr></nobr>.onion services (forums etc) are more interesting than what's on the rest of the public internet anyways. It's amusing and interesting to see what people have to say on forums when they are really able to be anonymous (trolling aside).</htmltext>
<tokenext>I use TOR mostly for browsing .onion sites , inaccessible without it .
Also , if you set up your connection/system properly , you * can * browse anonymously .
The idea is that your ISP and external website ( and exit node ) ca n't identify who you are .
This is a VERY good thing .
I would , however , not log into any service that could identify me as " me " online through tor .
Ever.As a personal opinion , many of the .onion services ( forums etc ) are more interesting than what 's on the rest of the public internet anyways .
It 's amusing and interesting to see what people have to say on forums when they are really able to be anonymous ( trolling aside ) .</tokentext>
<sentencetext>I use TOR mostly for browsing .onion sites, inaccessible without it.
Also, if you set up your connection/system properly, you *can* browse anonymously.
The idea is that your ISP and external website (and exit node) can't identify who you are.
This is a VERY good thing.
I would, however, not log into any service that could identify me as "me" online through tor.
Ever.As a personal opinion, many of the .onion services (forums etc) are more interesting than what's on the rest of the public internet anyways.
It's amusing and interesting to see what people have to say on forums when they are really able to be anonymous (trolling aside).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865163</id>
	<title>Android is spyware</title>
	<author>Anonymous</author>
	<datestamp>1256491860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Why would anyone interested in protecting their privacy even use an Android phone?</p><p>With Android being made by Google, the company that wants everything about you to live in the benevolent Google cloud, Android is one huge violation of privacy.</p></htmltext>
<tokenext>Why would anyone interested in protecting their privacy even use an Android phone ? With Android being made by Google , the company that wants everything about you to live in the benevolent Google cloud , Android is one huge violation of privacy .</tokentext>
<sentencetext>Why would anyone interested in protecting their privacy even use an Android phone?With Android being made by Google, the company that wants everything about you to live in the benevolent Google cloud, Android is one huge violation of privacy.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864725</id>
	<title>Re:Except you must still trust Tor</title>
	<author>dagamer34</author>
	<datestamp>1256487600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you have data that's so important that you don't want the Chinese or NSA looking at it, send it by snail mail on a disk!</htmltext>
<tokenext>If you have data that 's so important that you do n't want the Chinese or NSA looking at it , send it by snail mail on a disk !</tokentext>
<sentencetext>If you have data that's so important that you don't want the Chinese or NSA looking at it, send it by snail mail on a disk!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29872753</id>
	<title>Re:!secure</title>
	<author>cbiltcliffe</author>
	<datestamp>1256573520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>People should really stop using the word secure with Tor. Anonymous, sure, but you actually forfeit some of your security and privacy when using Tor. Anyone can snoop your outgoing connections from Exit node, or if you're using https or other secure connection, change the certificates. On top of that there's a change the exit node changes your http pages in addition to stealing or just snooping for information. Implying "secure" in news likes this gives lots of false sense of security to users, like has been seen many times before.</p></div><p>And this is different from regular web browsing....how, exactly?  You're not forteiting any of your security or privacy.  You're just not necessarily gaining any more in certain areas.  But, this only applies if the exit node you happen to be using for that connection is a malicious node.  Yes, governments can set up an awful lot of nodes, but the size of the network itself is going to dwarf anything a government can do.  The vast majority of exit nodes are legitimate.<br>You can also specify not to use certain exit nodes.  If you're in China, and you don't want to risk government interference, then configure your node to not use any Chinese exit nodes.</p><p><div class="quote"><p> <b>Eavesdropping by exit nodes</b> </p><p>In September 2007, Dan Egerstad, a Swedish security consultant, revealed that by operating and monitoring Tor exit nodes he had intercepted usernames and passwords for a large number of email accounts.<a href="http://www.wired.com/politics/security/news/2007/09/embassy\_hacks?currentPage=1" title="wired.com">[15]</a> [wired.com] As Tor does not, and by design cannot, encrypt the traffic between an exit node and the target server, any exit node is in a position to capture any traffic passing through it which does not use end-to-end encryption, e.g. SSL. While this does not inherently violate the anonymity of the source, it affords added opportunities for data interception by self-selected third parties, greatly increasing the risk of exposure of sensitive data by users who are careless or who mistake Tor's anonymity for security.<a href="http://www.securityfocus.com/news/11447" title="securityfocus.com">[16]</a> [securityfocus.com] </p></div><p>So, jerks can break your security.  Big news.  Film at 11.  Maybe the fact that this can be done anywhere at all, unless you're using an unbreakable encryption/authentication method, means you shouldn't be worrying about Tor specifically.</p><p><div class="quote"><p>Another thing is that you are still usually leaking DNS queries to your ISP, which may even return false results if you're being censored in China or something and they still see what sites you're visiting.</p><p>The summary also quickly mentions geo-aware phones. If you happen to be using that bad exit node, now your geo-location updates will be transmitted via it too. And goverments should be able to set up a lot different exit nodes all around the world easily.</p><p>So no, it's not secure. It's maybe anonymous, if you use it correctly and don't login to your banking, slashdot account or whatever with it.</p></div><p>This is patently incorrect.  All DNS queries from a Tor-surfing browser are routed over the Tor network.  There are specific instructions for the setup of a Tor exit node that state basically "If your ISP blocks access to certain sites, make sure your Tor node knows about them, otherwise Tor users will get NORECORD results from DNS queries, and think the site is down/missing.  If your node knows about them, the Tor network will not use your node to attempt access to those sites."</p><p>I've stumbled across a misconfigured Tor exit node before that did this.  Trying to access a site over Tor resulted in an error page, but the same site over the Internet worked fine.  Waited for 10 minutes for the Tor connection to cycle to a different route, and all of a sudden I could access it over Tor, too.</p></div>
	</htmltext>
<tokenext>People should really stop using the word secure with Tor .
Anonymous , sure , but you actually forfeit some of your security and privacy when using Tor .
Anyone can snoop your outgoing connections from Exit node , or if you 're using https or other secure connection , change the certificates .
On top of that there 's a change the exit node changes your http pages in addition to stealing or just snooping for information .
Implying " secure " in news likes this gives lots of false sense of security to users , like has been seen many times before.And this is different from regular web browsing....how , exactly ?
You 're not forteiting any of your security or privacy .
You 're just not necessarily gaining any more in certain areas .
But , this only applies if the exit node you happen to be using for that connection is a malicious node .
Yes , governments can set up an awful lot of nodes , but the size of the network itself is going to dwarf anything a government can do .
The vast majority of exit nodes are legitimate.You can also specify not to use certain exit nodes .
If you 're in China , and you do n't want to risk government interference , then configure your node to not use any Chinese exit nodes .
Eavesdropping by exit nodes In September 2007 , Dan Egerstad , a Swedish security consultant , revealed that by operating and monitoring Tor exit nodes he had intercepted usernames and passwords for a large number of email accounts .
[ 15 ] [ wired.com ] As Tor does not , and by design can not , encrypt the traffic between an exit node and the target server , any exit node is in a position to capture any traffic passing through it which does not use end-to-end encryption , e.g .
SSL. While this does not inherently violate the anonymity of the source , it affords added opportunities for data interception by self-selected third parties , greatly increasing the risk of exposure of sensitive data by users who are careless or who mistake Tor 's anonymity for security .
[ 16 ] [ securityfocus.com ] So , jerks can break your security .
Big news .
Film at 11 .
Maybe the fact that this can be done anywhere at all , unless you 're using an unbreakable encryption/authentication method , means you should n't be worrying about Tor specifically.Another thing is that you are still usually leaking DNS queries to your ISP , which may even return false results if you 're being censored in China or something and they still see what sites you 're visiting.The summary also quickly mentions geo-aware phones .
If you happen to be using that bad exit node , now your geo-location updates will be transmitted via it too .
And goverments should be able to set up a lot different exit nodes all around the world easily.So no , it 's not secure .
It 's maybe anonymous , if you use it correctly and do n't login to your banking , slashdot account or whatever with it.This is patently incorrect .
All DNS queries from a Tor-surfing browser are routed over the Tor network .
There are specific instructions for the setup of a Tor exit node that state basically " If your ISP blocks access to certain sites , make sure your Tor node knows about them , otherwise Tor users will get NORECORD results from DNS queries , and think the site is down/missing .
If your node knows about them , the Tor network will not use your node to attempt access to those sites .
" I 've stumbled across a misconfigured Tor exit node before that did this .
Trying to access a site over Tor resulted in an error page , but the same site over the Internet worked fine .
Waited for 10 minutes for the Tor connection to cycle to a different route , and all of a sudden I could access it over Tor , too .</tokentext>
<sentencetext>People should really stop using the word secure with Tor.
Anonymous, sure, but you actually forfeit some of your security and privacy when using Tor.
Anyone can snoop your outgoing connections from Exit node, or if you're using https or other secure connection, change the certificates.
On top of that there's a change the exit node changes your http pages in addition to stealing or just snooping for information.
Implying "secure" in news likes this gives lots of false sense of security to users, like has been seen many times before.And this is different from regular web browsing....how, exactly?
You're not forteiting any of your security or privacy.
You're just not necessarily gaining any more in certain areas.
But, this only applies if the exit node you happen to be using for that connection is a malicious node.
Yes, governments can set up an awful lot of nodes, but the size of the network itself is going to dwarf anything a government can do.
The vast majority of exit nodes are legitimate.You can also specify not to use certain exit nodes.
If you're in China, and you don't want to risk government interference, then configure your node to not use any Chinese exit nodes.
Eavesdropping by exit nodes In September 2007, Dan Egerstad, a Swedish security consultant, revealed that by operating and monitoring Tor exit nodes he had intercepted usernames and passwords for a large number of email accounts.
[15] [wired.com] As Tor does not, and by design cannot, encrypt the traffic between an exit node and the target server, any exit node is in a position to capture any traffic passing through it which does not use end-to-end encryption, e.g.
SSL. While this does not inherently violate the anonymity of the source, it affords added opportunities for data interception by self-selected third parties, greatly increasing the risk of exposure of sensitive data by users who are careless or who mistake Tor's anonymity for security.
[16] [securityfocus.com] So, jerks can break your security.
Big news.
Film at 11.
Maybe the fact that this can be done anywhere at all, unless you're using an unbreakable encryption/authentication method, means you shouldn't be worrying about Tor specifically.Another thing is that you are still usually leaking DNS queries to your ISP, which may even return false results if you're being censored in China or something and they still see what sites you're visiting.The summary also quickly mentions geo-aware phones.
If you happen to be using that bad exit node, now your geo-location updates will be transmitted via it too.
And goverments should be able to set up a lot different exit nodes all around the world easily.So no, it's not secure.
It's maybe anonymous, if you use it correctly and don't login to your banking, slashdot account or whatever with it.This is patently incorrect.
All DNS queries from a Tor-surfing browser are routed over the Tor network.
There are specific instructions for the setup of a Tor exit node that state basically "If your ISP blocks access to certain sites, make sure your Tor node knows about them, otherwise Tor users will get NORECORD results from DNS queries, and think the site is down/missing.
If your node knows about them, the Tor network will not use your node to attempt access to those sites.
"I've stumbled across a misconfigured Tor exit node before that did this.
Trying to access a site over Tor resulted in an error page, but the same site over the Internet worked fine.
Waited for 10 minutes for the Tor connection to cycle to a different route, and all of a sudden I could access it over Tor, too.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864975</id>
	<title>brb fbi</title>
	<author>Anonymous</author>
	<datestamp>1256489880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Of course, as soon as you connect to Tor your device will become a conduit for people accessing contraband. Have fun explaining that to the authorities, your boss, your family...</p></htmltext>
<tokenext>Of course , as soon as you connect to Tor your device will become a conduit for people accessing contraband .
Have fun explaining that to the authorities , your boss , your family.. .</tokentext>
<sentencetext>Of course, as soon as you connect to Tor your device will become a conduit for people accessing contraband.
Have fun explaining that to the authorities, your boss, your family...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866053</id>
	<title>Re:Just in case 3G isn't slow enough already...</title>
	<author>interkin3tic</author>
	<datestamp>1256498940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Not to mention the localization issues.  The one time I used tor, loading up google gave me a brief scare when it appeared in Cyrillic.  For a split second I though I had somehow accessed some secret KGB google.</p><p>Subsequent split seconds were spent laughing at that first though.</p></htmltext>
<tokenext>Not to mention the localization issues .
The one time I used tor , loading up google gave me a brief scare when it appeared in Cyrillic .
For a split second I though I had somehow accessed some secret KGB google.Subsequent split seconds were spent laughing at that first though .</tokentext>
<sentencetext>Not to mention the localization issues.
The one time I used tor, loading up google gave me a brief scare when it appeared in Cyrillic.
For a split second I though I had somehow accessed some secret KGB google.Subsequent split seconds were spent laughing at that first though.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865183</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864737</id>
	<title>Re:!secure</title>
	<author>Anonymous</author>
	<datestamp>1256487660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>All he is saying is TOR exit nodes may be run by black-hats/phishers and you would never know what the exit node will do with your information. The exit node still cannot pin point your IP address, but is really free to store your unencrypted passwords, insert malicious java scripts into pages you browse.<br> <br>

In contrast I (sorta) trust my ISP/any\_node\_trusted\_by\_my\_ISP to not insert objects into pages I browse.</htmltext>
<tokenext>All he is saying is TOR exit nodes may be run by black-hats/phishers and you would never know what the exit node will do with your information .
The exit node still can not pin point your IP address , but is really free to store your unencrypted passwords , insert malicious java scripts into pages you browse .
In contrast I ( sorta ) trust my ISP/any \ _node \ _trusted \ _by \ _my \ _ISP to not insert objects into pages I browse .</tokentext>
<sentencetext>All he is saying is TOR exit nodes may be run by black-hats/phishers and you would never know what the exit node will do with your information.
The exit node still cannot pin point your IP address, but is really free to store your unencrypted passwords, insert malicious java scripts into pages you browse.
In contrast I (sorta) trust my ISP/any\_node\_trusted\_by\_my\_ISP to not insert objects into pages I browse.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864607</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865019</id>
	<title>Re:cell co.s will be thrilled</title>
	<author>Anonymous</author>
	<datestamp>1256490480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>I'm pretty sure it doesn't use several times the bandwidth of a typical direct connection. It just connects to another peer.</htmltext>
<tokenext>I 'm pretty sure it does n't use several times the bandwidth of a typical direct connection .
It just connects to another peer .</tokentext>
<sentencetext>I'm pretty sure it doesn't use several times the bandwidth of a typical direct connection.
It just connects to another peer.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864739</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866557</id>
	<title>Re:!secure</title>
	<author>skeeto</author>
	<datestamp>1256502780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>and don't login to your banking</p></div><p>Online banking uses https, so it's safe to do over Tor (though pointless anyway). Just don't ignore any self-signed certificate warnings.</p></div>
	</htmltext>
<tokenext>and do n't login to your bankingOnline banking uses https , so it 's safe to do over Tor ( though pointless anyway ) .
Just do n't ignore any self-signed certificate warnings .</tokentext>
<sentencetext>and don't login to your bankingOnline banking uses https, so it's safe to do over Tor (though pointless anyway).
Just don't ignore any self-signed certificate warnings.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867619</id>
	<title>Re:!secure</title>
	<author>AHuxley</author>
	<datestamp>1256471760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You could just port filter it for IM, sit back and read, how many use encrypted settings?<br>
Less risk and something new everyday.</htmltext>
<tokenext>You could just port filter it for IM , sit back and read , how many use encrypted settings ?
Less risk and something new everyday .</tokentext>
<sentencetext>You could just port filter it for IM, sit back and read, how many use encrypted settings?
Less risk and something new everyday.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864937</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865097</id>
	<title>Re:!secure</title>
	<author>\_Sprocket\_</author>
	<datestamp>1256491260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It's an issue of opportunity.  If you want to sniff traffic, you have to put yourself in to a position to do so.  Either you work for a large enough network that gives you access to the appropriate devices, convince those network owners that they should provide you with information, insert your own devices in someone else's network, or you build your own network large enough for sufficient targets.  Setting up an exit node allows you to slip in your own device in a large network with very little cost.</p></htmltext>
<tokenext>It 's an issue of opportunity .
If you want to sniff traffic , you have to put yourself in to a position to do so .
Either you work for a large enough network that gives you access to the appropriate devices , convince those network owners that they should provide you with information , insert your own devices in someone else 's network , or you build your own network large enough for sufficient targets .
Setting up an exit node allows you to slip in your own device in a large network with very little cost .</tokentext>
<sentencetext>It's an issue of opportunity.
If you want to sniff traffic, you have to put yourself in to a position to do so.
Either you work for a large enough network that gives you access to the appropriate devices, convince those network owners that they should provide you with information, insert your own devices in someone else's network, or you build your own network large enough for sufficient targets.
Setting up an exit node allows you to slip in your own device in a large network with very little cost.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864607</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864561</id>
	<title>Re:!secure</title>
	<author>Anonymous</author>
	<datestamp>1256485740000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Eat my <a href="http://goatse.fr/" title="goatse.fr" rel="nofollow">goatse'd</a> [goatse.fr] penis!</p><p>Tor is good for keeping you secure from niggers.</p></htmltext>
<tokenext>Eat my goatse 'd [ goatse.fr ] penis ! Tor is good for keeping you secure from niggers .</tokentext>
<sentencetext>Eat my goatse'd [goatse.fr] penis!Tor is good for keeping you secure from niggers.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625</id>
	<title>Except you must still trust Tor</title>
	<author>Gothmolly</author>
	<datestamp>1256486520000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>You must still assume that the Tor nodes you are using are not hacked NSA or Chinese intelligence agency nodes, with a nice 'log traffic to disk' function added.  If you really care, you need something like Opportunistic Encryption.</p></htmltext>
<tokenext>You must still assume that the Tor nodes you are using are not hacked NSA or Chinese intelligence agency nodes , with a nice 'log traffic to disk ' function added .
If you really care , you need something like Opportunistic Encryption .</tokentext>
<sentencetext>You must still assume that the Tor nodes you are using are not hacked NSA or Chinese intelligence agency nodes, with a nice 'log traffic to disk' function added.
If you really care, you need something like Opportunistic Encryption.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866181</id>
	<title>Re:Why not use VPN to maintain the speed?</title>
	<author>fustar</author>
	<datestamp>1256499720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Both LT2P and IPSEC (preshared and certificate) are supported by the OS</htmltext>
<tokenext>Both LT2P and IPSEC ( preshared and certificate ) are supported by the OS</tokentext>
<sentencetext>Both LT2P and IPSEC (preshared and certificate) are supported by the OS</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865395</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865955</id>
	<title>Re:Privacy is the next killer ap</title>
	<author>dontmakemethink</author>
	<datestamp>1256498280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Companies are already making too much money abusing our lack of privacy.  Why stop now?</htmltext>
<tokenext>Companies are already making too much money abusing our lack of privacy .
Why stop now ?</tokentext>
<sentencetext>Companies are already making too much money abusing our lack of privacy.
Why stop now?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864539</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865109</id>
	<title>not secure</title>
	<author>bananaquackmoo</author>
	<datestamp>1256491380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Um, I'm actually quite sure that the cellphone companies can still track your surfing based on your phone number, chip, and hardware. If you mean anonymous browsing via wifi, that might be a different story.</htmltext>
<tokenext>Um , I 'm actually quite sure that the cellphone companies can still track your surfing based on your phone number , chip , and hardware .
If you mean anonymous browsing via wifi , that might be a different story .</tokentext>
<sentencetext>Um, I'm actually quite sure that the cellphone companies can still track your surfing based on your phone number, chip, and hardware.
If you mean anonymous browsing via wifi, that might be a different story.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29886993</id>
	<title>Re:!secure</title>
	<author>Anonymous</author>
	<datestamp>1256672340000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>STFU. If you used it you would understand how it works (ie,You can not even do a simple google search via tor-for one. Browsing is the key word idiot.</p></htmltext>
<tokenext>STFU .
If you used it you would understand how it works ( ie,You can not even do a simple google search via tor-for one .
Browsing is the key word idiot .</tokentext>
<sentencetext>STFU.
If you used it you would understand how it works (ie,You can not even do a simple google search via tor-for one.
Browsing is the key word idiot.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865781</id>
	<title>Re:!secure</title>
	<author>Anonymous</author>
	<datestamp>1256496960000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Anything you send plain-text over the internet can be intercepted by third parties. Tor just makes it easier for people to do that to you. In other words, Tor just makes an existing flaw in your understanding of security that much more noticeable. You should already be using SSL for all logins and you should be validating those certificates every time. You're just used to security through obscurity which is why you think Tor is so insecure. It's not. You're just stupid and lazy.

That being said, I still wouldn't run my banking through Tor because my bank already knows who I am. So not only is your understanding extremely limited, your examples are pointless. We don't want to bank through Tor but thanks Captain Obvious, for telling us not to.</htmltext>
<tokenext>Anything you send plain-text over the internet can be intercepted by third parties .
Tor just makes it easier for people to do that to you .
In other words , Tor just makes an existing flaw in your understanding of security that much more noticeable .
You should already be using SSL for all logins and you should be validating those certificates every time .
You 're just used to security through obscurity which is why you think Tor is so insecure .
It 's not .
You 're just stupid and lazy .
That being said , I still would n't run my banking through Tor because my bank already knows who I am .
So not only is your understanding extremely limited , your examples are pointless .
We do n't want to bank through Tor but thanks Captain Obvious , for telling us not to .</tokentext>
<sentencetext>Anything you send plain-text over the internet can be intercepted by third parties.
Tor just makes it easier for people to do that to you.
In other words, Tor just makes an existing flaw in your understanding of security that much more noticeable.
You should already be using SSL for all logins and you should be validating those certificates every time.
You're just used to security through obscurity which is why you think Tor is so insecure.
It's not.
You're just stupid and lazy.
That being said, I still wouldn't run my banking through Tor because my bank already knows who I am.
So not only is your understanding extremely limited, your examples are pointless.
We don't want to bank through Tor but thanks Captain Obvious, for telling us not to.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864821
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867619
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864937
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864607
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864737
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864607
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867101
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866557
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865781
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866257
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864877
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866053
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865183
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29872753
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867177
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864561
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29868535
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29868443
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866181
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865395
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29886993
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865059
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864539
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864725
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865567
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865097
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864607
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867649
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865899
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864539
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865019
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864739
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864881
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865955
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864539
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864651
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866061
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_10_25_1316233_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867433
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864625
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864725
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867649
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866061
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867101
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864739
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865019
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865395
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866181
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864573
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864869
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29868443
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29868535
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864539
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865059
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865955
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865899
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865163
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864529
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864881
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864651
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29886993
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864877
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29872753
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865567
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867177
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864821
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864607
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864737
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864937
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867619
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865097
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866557
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866257
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864561
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29867433
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865781
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866727
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29865183
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29866053
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_10_25_1316233.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_10_25_1316233.29864975
</commentlist>
</conversation>
