NSA attacks DeepArcher

Robin Landseadel robinlandseadel at comcast.net
Sun Oct 6 20:31:10 CDT 2013


" . . . The National Security Agency has made repeated attempts to  
develop attacks against people using Tor, a popular tool designed to  
protect online anonymity, despite the fact the software is primarily  
funded and promoted by the US government itself.
Top-secret NSA documents, disclosed by whistleblower Edward Snowden,  
reveal that the agency's current successes against Tor rely on  
identifying users and then attacking vulnerable software on their  
computers. One technique developed by the agency targeted the Firefox  
web browser used with Tor, giving the agency full control over  
targets' computers, including access to files, all keystrokes and all  
online activity.

But the documents suggest that the fundamental security of the Tor  
service remains intact. One top-secret presentation, titled 'Tor  
Stinks', states: "We will never be able to de-anonymize all Tor users  
all the time." It continues: "With manual analysis we can de-anonymize  
a very small fraction of Tor users," and says the agency has had "no  
success de-anonymizing a user in response" to a specific request.

Another top-secret presentation calls Tor "the king of high-secure,  
low-latency internet anonymity". . . ."

More:


http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
-
Pynchon-l / http://www.waste.org/mail/?list=pynchon-l



More information about the Pynchon-l mailing list