[tor-talk] use gpg or fork in tor

raiogam mestri raiogam at hotmail.com
Fri Jul 4 01:35:49 UTC 2014


i'm a devif tor not use it is nsa can spy torif not 2 key 1 for encript and 1 for decript not workanyone and someone have encript key anyone and someone  encript and send to user via torthe user have decript keyand receive the code encript via torand decrypt they

i  search "open source" and look this after is line is quote.NSA says it only gathers such data for "valid foreign intelligence purposes."by Cyrus Farivar - July 3 2014, 3:40pm HBNATIONAL SECURITY35 Enlarge  / The structure of a three-hop Tor circuit.NSA LEAKSNew Snowden docs: NSA spies on pretty much everyone abroadPakistan, Iran, and… USA? New heatmap shows where NSA hacksWhat the NSA can (and can’t) mine from intercepted photosSnowden complained about mass surveillance tactics to his NSA mastersNSA loves The Bahamas so much it records all its cellphone callsView all…Two Germany-based Tor Directory Authority  servers, among others, have been specifically targeted by the National Security Agency’s XKeyscore program, according to a new report  from German public broadcaster ARD. Tor  is a well-known open source project designed to keep users anonymous and untraceable—users' traffic is encrypted and bounced across various computers worldwide to keep it hidden.This marks the first time that actual source code  from XKeyscore has been published. ARD did not say how or where it obtained the code. Unlike many other NSA-related stories, the broadcaster did not specifically mention the information being part of the trove leaked by whistleblower Edward Snowden.XKeyscore is one of the high-level NSA surveillance programs that have been revealed via Snowden over the last year. The interface allows NSA and allied intelligence agencies to search all kinds of short-term data captured directly off of various Internet Exchanges worldwide.This new code, which was published on Thursday, appears to flag people who are believed to live outside the United States and who request Tor bridge information via e-mail or who search for or download Tor or the security-minded TAILS operating system . Those users' IP addresses can then be tracked for further monitoring.The report’s authors include Jacob Appelbaum, a well-known American computer security researcher who has taken up residence in Berlin. Appelbaum is also a paid employee of the Tor Project. Two others listed as authors are either contractors or volunteers to Tor.“Their research in this story is wholly independent from the Tor Project and does not reflect the views of the Tor Project in any way,” ARD stated in a disclosure. “During the course of the investigation, it was further discovered that an additional computer system run by Jacob Appelbaum for his volunteer work with helping to run part of the Tor network was targeted by the NSA. Moreover, all members of this team are Tor users and appear to be have been targets of the mass surveillance described in the investigation.”FURTHER READINGBUILDING A PANOPTICON: THE EVOLUTION OF THE NSA’S XKEYSCOREHow the NSA went from off-the-shelf to a homegrown "Google for packets."The code specifically cites IP addresses of the Tor Directory Authority—these servers act as the nine high-level control points that make up the backbone of the Tor Network. These authorities are what keep track of new Tor relays, and they are updated every hour.Tor was originally developed as part of the Onion Routing project at the US Naval Research Laboratory . While today it exists as an independent nonprofit organization headquartered in Massachusetts, it still receives 60 percent of its income  (PDF) from US government sources. Tor is used by journalists, law enforcement, military officers, and activists worldwide.Another rule in the published code shows that the NSA is also targeting users of an anonymous e-mail program called MixMinion , which is hosted on a server at the Massachusetts Institute of Technology. Roger Dingledine, who is the head of the Tor Project, also runs this MixMinion server.Vanee Vines, the spokeswoman for the NSA, responded to Ars' request for comment with the same statement that she provided to ARD:In carrying out its mission, NSA collects only what it is authorized by law to collect for valid foreign intelligence purposes—regardless of the technical means used by foreign intelligence targets. The communications of people who are not foreign intelligence targets are of no use to the agency.In January, President Obama issued U.S. Presidential Policy Directive 28 , which affirms that all persons—regardless of nationality—have legitimate privacy interests in the handling of their personal information, and that privacy and civil liberties shall be integral considerations in the planning of U.S. signals intelligence activities.The president's directive also makes clear that the United States does not collect signals intelligence for the purpose of suppressing or burdening criticism or dissent, or for disadvantaging persons based on their ethnicity, race, gender, sexual orientation, or religion.XKeyscore is an analytic tool that is used as a part of NSA's lawful foreign signals intelligence collection system. Such tools have stringent oversight and compliance mechanisms built in at several levels. The use of XKeyscore allows the agency to help defend the nation and protect U.S. and allied troops abroad.All of NSA's operations are conducted in strict accordance with the rule of law, including the President's new directive.
 		 	   		   		 	   		   		 	   		  


More information about the tor-talk mailing list