infosec
N reasons why the spooks love Tribler
Great security analysis of promises-to-make-bittorrent-anonymous app Tribler TLDR: Do not use this if your threat model includes active attackers, adversaries versed in cryptography, those with lots of money, or if you wish to be anonymous. Many problems come from using sources of "random" numbers that are pseudorandom (ie.