i'm a devif tor not use it is nsa can spy torif not 2 key 1 for encript and 1
for decript not workanyone and someone have encript key anyone and someone
encript and send to user via torthe user have decript keyand receive the code
encript via torand decrypt they
i search "open source" and look this after is line is quote.NSA says it only
gathers such data for "valid foreign intelligence purposes."by Cyrus Farivar -
July 3 2014, 3:40pm HBNATIONAL SECURITY35 Enlarge / The structure of a
three-hop Tor circuit.NSA LEAKSNew Snowden docs: NSA spies on pretty much
everyone abroadPakistan, Iran, and… USA? New heatmap shows where NSA hacksWhat
the NSA can (and can’t) mine from intercepted photosSnowden complained about
mass surveillance tactics to his NSA mastersNSA loves The Bahamas so much it
records all its cellphone callsView all…Two Germany-based Tor Directory
Authority servers, among others, have been specifically targeted by the
National Security Agency’s XKeyscore program, according to a new report from
German public broadcaster ARD. Tor is a well-known open source project
designed to keep users anonymous and untraceable—users' traffic is encrypted
and bounced across various computers worldwide to keep it hidden.This marks the
first time that actual source code from XKeyscore has been published. ARD did
not say how or where it obtained the code. Unlike many other NSA-related
stories, the broadcaster did not specifically mention the information being
part of the trove leaked by whistleblower Edward Snowden.XKeyscore is one of
the high-level NSA surveillance programs that have been revealed via Snowden
over the last year. The interface allows NSA and allied intelligence agencies
to search all kinds of short-term data captured directly off of various
Internet Exchanges worldwide.This new code, which was published on Thursday,
appears to flag people who are believed to live outside the United States and
who request Tor bridge information via e-mail or who search for or download Tor
or the security-minded TAILS operating system . Those users' IP addresses can
then be tracked for further monitoring.The report’s authors include Jacob
Appelbaum, a well-known American computer security researcher who has taken up
residence in Berlin. Appelbaum is also a paid employee of the Tor Project. Two
others listed as authors are either contractors or volunteers to Tor.“Their
research in this story is wholly independent from the Tor Project and does not
reflect the views of the Tor Project in any way,” ARD stated in a disclosure.
“During the course of the investigation, it was further discovered that an
additional computer system run by Jacob Appelbaum for his volunteer work with
helping to run part of the Tor network was targeted by the NSA. Moreover, all
members of this team are Tor users and appear to be have been targets of the
mass surveillance described in the investigation.”FURTHER READINGBUILDING A
PANOPTICON: THE EVOLUTION OF THE NSA’S XKEYSCOREHow the NSA went from
off-the-shelf to a homegrown "Google for packets."The code specifically cites
IP addresses of the Tor Directory Authority—these servers act as the nine
high-level control points that make up the backbone of the Tor Network. These
authorities are what keep track of new Tor relays, and they are updated every
hour.Tor was originally developed as part of the Onion Routing project at the
US Naval Research Laboratory . While today it exists as an independent
nonprofit organization headquartered in Massachusetts, it still receives 60
percent of its income (PDF) from US government sources. Tor is used by
journalists, law enforcement, military officers, and activists
worldwide.Another rule in the published code shows that the NSA is also
targeting users of an anonymous e-mail program called MixMinion , which is
hosted on a server at the Massachusetts Institute of Technology. Roger
Dingledine, who is the head of the Tor Project, also runs this MixMinion
server.Vanee Vines, the spokeswoman for the NSA, responded to Ars' request for
comment with the same statement that she provided to ARD:In carrying out its
mission, NSA collects only what it is authorized by law to collect for valid
foreign intelligence purposes—regardless of the technical means used by foreign
intelligence targets. The communications of people who are not foreign
intelligence targets are of no use to the agency.In January, President Obama
issued U.S. Presidential Policy Directive 28 , which affirms that all
persons—regardless of nationality—have legitimate privacy interests in the
handling of their personal information, and that privacy and civil liberties
shall be integral considerations in the planning of U.S. signals intelligence
activities.The president's directive also makes clear that the United States
does not collect signals intelligence for the purpose of suppressing or
burdening criticism or dissent, or for disadvantaging persons based on their
ethnicity, race, gender, sexual orientation, or religion.XKeyscore is an
analytic tool that is used as a part of NSA's lawful foreign signals
intelligence collection system. Such tools have stringent oversight and
compliance mechanisms built in at several levels. The use of XKeyscore allows
the agency to help defend the nation and protect U.S. and allied troops
abroad.All of NSA's operations are conducted in strict accordance with the rule
of law, including the President's new directive.
--
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk