[tor-talk] according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

Seth David Schoen schoen at eff.org
Thu Jul 3 17:47:30 UTC 2014


Jacob Appelbaum writes:

> On 7/3/14, Eugen Leitl <eugen at leitl.org> wrote:
> >
> > http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html
> > </kraut>
> 
> Here is our larger story (in English) which includes excerpts of source code:
> 
>   http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html

Does anyone have theories about this part right at the bottom?

   /**
    * Placeholder fingerprint for Tor hidden service addresses.
    * Real fingerpritns will be fired by the plugins
    *   'anonymizer/tor/plugin/onion/*'
    */
   fingerprint('anonymizer/tor/hiddenservice/address') = nil;
   // END_DEFINITION

Does this suggest anything interesting about the ability to determine
either the physical location of a hidden service's service or instances
of people accessing a hidden service?

I also think that it's interesting that there's a category called
"documents/comsec", so the bigger picture is that there's an organized
way to find out about people who are interested in or becoming educated
about COMSEC.  It seems conceivable that documentation that I and other
people here have helped write is a part of other "documents/comsec"
fingerprints.

-- 
Seth Schoen  <schoen at eff.org>
Senior Staff Technologist                       https://www.eff.org/
Electronic Frontier Foundation                  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109       +1 415 436 9333 x107


More information about the tor-talk mailing list