NSA attacks DeepArcher
Robin Landseadel
robinlandseadel at comcast.net
Sun Oct 6 20:31:10 CDT 2013
" . . . The National Security Agency has made repeated attempts to
develop attacks against people using Tor, a popular tool designed to
protect online anonymity, despite the fact the software is primarily
funded and promoted by the US government itself.
Top-secret NSA documents, disclosed by whistleblower Edward Snowden,
reveal that the agency's current successes against Tor rely on
identifying users and then attacking vulnerable software on their
computers. One technique developed by the agency targeted the Firefox
web browser used with Tor, giving the agency full control over
targets' computers, including access to files, all keystrokes and all
online activity.
But the documents suggest that the fundamental security of the Tor
service remains intact. One top-secret presentation, titled 'Tor
Stinks', states: "We will never be able to de-anonymize all Tor users
all the time." It continues: "With manual analysis we can de-anonymize
a very small fraction of Tor users," and says the agency has had "no
success de-anonymizing a user in response" to a specific request.
Another top-secret presentation calls Tor "the king of high-secure,
low-latency internet anonymity". . . ."
More:
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
-
Pynchon-l / http://www.waste.org/mail/?list=pynchon-l
More information about the Pynchon-l
mailing list