Posts Tagged ‘TOR’

darknet-100-_v-standard644_c81a3a

Advertisements

030416_PDPost.png

Tor Was Built, Then Hacked by Pentagon

 

Last fall, we learned that one branch of the Navy paid Carnegie-Mellon University researchers to hack into the “onion routing” encryption system called Tor, which was spawned by a different branch of the Navy, the Naval Research Laboratory. The FBI used the hack to penetrate the Dark Web and bust Silk Road 2.0, and Levine asserts that Tor is falsely advertised as impenetrable, and promoted by Ed Snowden. Laura Poitras and Glenn Greenwald…

 

tor-freaks (1)

I posted on this back when it broke.

“I contract for the United States Government to build anonymity technology for them and deploy it.”

— Roger Dingledine, cofounder of Tor, 2004

How leading Tor developers and advocates tried to smear me after I reported their US Government ties

Finally, I pointed out that Tor was not nearly as secure as many of its proponents claimed. For people with really something to hide from the state, Tor very likely offered the opposite of anonymity: it singled out users for total NSA surveillance, with intel agencies potentially sucking up and recording everything they did online. Recent events have proven yet again that Tor is not as secure as its fans claim, or as its own developerssay they hoped.

tor_police-800_69094d

 

“But the German exposé  showed Tor providing the opposite of anonymity: it singled out users for total NSA surveillance, potentially sucking up and recording everything they did online.”

Tor was developed, built and financed by the US military-surveillance complex. Tor’s original — and current — purpose is to cloak the online identity of government agents and informants while they are in the field: gathering intelligence, setting up sting operations, giving human intelligence assets a way to report back to their handlers — that kind of thing

 

Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government

HONG KONG-US-LAW-SNOWDEN-POLITICS-FILES

 

Guardian:

Attacking Tor: how the NSA targets users’ online anonymity

TOR will not help you.  NSA uses “exploits” in your computer’s software to plant viruses and to hack into your system.  TOR users are favorite targets for this war machine.  Guardian posted the most in depth analysis yet from Edward Snowden’s exposures.

The NSA refers to these capabilities as CNE, or computer network exploitation.

After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user’s computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems.

Waging war on American civilians is defined as treason in our Constitution.  When cyber war attacks are launched on US citizen’s computers, this is high treason and should be treated as such.

 

This Machine Kills Secrets

Posted: September 19, 2012 in -
Tags: , , , ,

Book Trailer about Wikileaks investigation, the history and people who put Wikileaks and its copycats on the map.

 

http://www.thismachinekillssecrets.com/