NSA attacks DeepArcher

Erik T. Burns eburns at gmail.com
Mon Oct 7 15:52:59 CDT 2013


this has a Bleeding Edge vibe to it: http://www.youtube.com/watch?v=FsF3HspQY6A

from http://www.banksyny.com/


On Mon, Oct 7, 2013 at 2:31 AM, Robin Landseadel
<robinlandseadel at comcast.net> wrote:
> " . . . The National Security Agency has made repeated attempts to develop
> attacks against people using Tor, a popular tool designed to protect online
> anonymity, despite the fact the software is primarily funded and promoted by
> the US government itself.
> Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal
> that the agency's current successes against Tor rely on identifying users
> and then attacking vulnerable software on their computers. One technique
> developed by the agency targeted the Firefox web browser used with Tor,
> giving the agency full control over targets' computers, including access to
> files, all keystrokes and all online activity.
>
> But the documents suggest that the fundamental security of the Tor service
> remains intact. One top-secret presentation, titled 'Tor Stinks', states:
> "We will never be able to de-anonymize all Tor users all the time." It
> continues: "With manual analysis we can de-anonymize a very small fraction
> of Tor users," and says the agency has had "no success de-anonymizing a user
> in response" to a specific request.
>
> Another top-secret presentation calls Tor "the king of high-secure,
> low-latency internet anonymity". . . ."
>
> More:
>
>
> http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
> -
> Pynchon-l / http://www.waste.org/mail/?list=pynchon-l
-
Pynchon-l / http://www.waste.org/mail/?list=pynchon-l



More information about the Pynchon-l mailing list