![]() ![]() Tor doesn’t protect you against any and all threats. If you are using Tor to send unencrypted information about yourself – like your email address or password – it could be captured by the spook’s exit node. If spook organization A happens to operate both the entry node and the exit node for your traffic, they could unravel your identity fairly easily. We cant trust the Net because routing makes my traffic pass through the U(/N)SA territory or through ISP that are collaborationists with the Nsa. ![]() The same apply as well for debian/fedora/slackware/ecc keys fingerprints. HTTPS security relies completely on trusting a central authority (CA’s), and the CA’s are under the control of the NSA. Or the fact that Dingledine (NSA internship) and Matheson were private contractors for the Naval Research Lab. Paul Syverson works at the Naval Research Lab. The Tor project allow the Broadcasting Board of Governors to run major Tor relays and exit nodes (saving the traffic for later decryption) that they are part of the CIA/DoD’s psywar operations. Tor project continue to accept money from the US Department of Defense and the Broadcasting Board of Governors. Tor uses 1024-bit RSA, (A recent Ars Tech article said everybody should move to 2048, so it’d be nice to have some reassurance here.) The BND assumes “a very high level of surveillance within the network”, including the possibility that anyone can “set up their own so-called exit nodes for monitoring”. According to the executive summary, Tor is “unsuitable” for three scenarios: “obfuscating activities on the internet”, “circumventing censorship measures” and “computer network operations for intelligence services” – spy agency hacking. The hacker unit “IT operations“ entitled its report: “The anonymity service Tor does not guarantee anonymity on the internet”. One and a half years later, the BND warned German federal agencies not to use Tor. ![]() The spies handed a prototype of this technology over to the US National Security Agency (NSA), in expectation of a favour in return. This is what emerges from a series of secret documents published by the German Netzpolitik blog. The German spy agency BND developed a system to monitor the anonymity network Tor and warned federal agencies that its anonymity is “ineffective”. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |