<div dir="ltr">In case you haven't seen the news today, here's the summary and analysis from Bruce Schneier good to send to your non-tech friends):  <div><br></div><div><a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity</a><br>
</div><div><br></div><div>And the leaked doc itself straight from GCHQ for straight up infosec nerds:</div><div><br></div><div><a href="http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document</a><br>
</div><div><br></div><div>Fascinating to see their capabilities and limitations. </div><div><br></div><div>Open question:  What does everyone think the next generation architecture/next versions of TOR should have given all of this?</div>
</div>