Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy.Apparently, this configuration file for XKeyscore is in the divulged data, which was obtained and studied by members of the Tor project and security specialists for German broadcasters NDR and WDR.
<a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&amp;sz=300x250%7C300x600&amp;tile=3&amp;c=33U7ZK6qwQrMkAACSrTugAAAP1&amp;t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank">
<img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&amp;sz=300x250%7C300x600&amp;tile=3&amp;c=33U7ZK6qwQrMkAACSrTugAAAP1&amp;t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a>
In their analysis of the alleged top-secret documents, they claim the NSA is, among other things:Specifically targeting Tor directory servers
Reading email contents for mentions of Tor bridges
Logging IP addresses used to search for privacy-focused websites and software
And possibly breaking international law in doing so.
We already know from leaked Snowden documents that Western intelligence agents hate Tor for its anonymizing abilities. But what the aforementioned leaked source code, written in a rather strange custom language, shows is that not only is the NSA targeting the anonymizing network Tor specifically, it is also taking digital fingerprints of any netizens who are remotely interested in privacy.
Group items matching
in title, tags, annotations or url
1More
1More
5 Best Linux Distros for Security - Datamation - 0 views
2More
Linux Foundation Advances Security Efforts via Badging Program - 0 views
2More
Penetration Testing with Kali Linux (OSCP) Course Review * HaCoder - 0 views
1More
Making UEFI Secure Boot Work With Open Platforms | The Linux Foundation - 0 views
2More
How to manage your passwords from the Linux command line - 0 views
5More
Use Tor or 'EXTREMIST' Tails Linux? Congrats, you're on the NSA's list * The Register - 0 views
1More
Linux Servers Security: Hack and Defend - Free Sample Chapter - Chris Binnie - 0 views
1More
Linux workstation security checklist | lfit/itpol @ GitHub - 0 views
1More
Linux Concerns: Convenience vs. Security - Datamation - 0 views
1More
Fallo en la biblioteca C de GNU que deja a miles de programas y a Linux desprotegido | ... - 0 views
1More
Linux Kernel Security (SELinux vs AppArmor vs Grsecurity) | [ # ! 2009 to check and upd... - 0 views
1More
Linux Today - How 'Security Fatigue' Affects Our Choices Online - 0 views
1More
Best Open Source Security Tools of 2015 (and 2016) - Linux Audit - 0 views
2More
Project fosters free, open, secure public hotspots · LinuxGizmos.com - 1 views
1More
Secure File Transfer | Linux Journal - 0 views
1More
Open Source Security Process -- Part 1: A Cloud Security Introduction | Linux.com - 0 views
‹ Previous
21 - 40 of 92
Next ›
Last »
Showing 20▼ items per page