NSA Battles Tor: 9 Facts
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
10/9/2013 | 11:17:24 AM
re: NSA Battles Tor: 9 Facts
It would be nice to have a good number of run of the mill users start using Tor. It makes the haystack bigger and surely will annoy the NSA, hopefully to a point where they give up.
I know it is not the NSA's task, but as long as I wake up every night because some truck rumbles through the pot holes on the street that has better looking cousins in third world countries the government should spend the money on infrastructure that serves a purpose than on nerds hunting down virtual targets.
Nice to see that DHS had something build that its subsidiary cannot crack.
User Rank: Author
10/8/2013 | 8:40:04 PM
re: NSA Battles Tor: 9 Facts
"Tor is a well-designed and robust anonymity tool, and successfully attacking it is difficult," Schneier said Monday in a blog post.
"The NSA attacks we found individually target Tor users by exploiting
vulnerabilities in their Firefox browsers, and not the Tor application
directly." FF vulnerabilities: still a favored tool.
User Rank: Ninja
10/8/2013 | 7:56:53 PM
re: NSA Battles Tor: 9 Facts
Each time I read an article like this, it remains me of the movie V for Vendetta. Worth to quote from it is: "...And where once you had the freedom to object, to think and speak as you saw fit, you now have censors and systems of surveillance coercing your
conformity and soliciting your submission. How did this happen? Who's to blame? Well, certainly there are those more responsible than others, and they will be held accountable, but again truth be told, if you're looking for the guilty, you need only look into a mirror."
Paraphrasing a great patriot, I'd say: If we restrict liberty to attain security we will lose them both.
If anyone is interested there's a tor browser called PirateBrowser. I won't post links to it, but the name will give you a hint where to get it.

The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.