Copy this bookmark:



bookmark detail

NSA and GCHQ target Tor network that protects anonymity of web users
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself. Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal that the agency's current successes against Tor rely on identifying users and then attacking vulnerable software on their computers. One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets' computers, including access to files, all keystrokes and all online activity. But the documents suggest that the fundamental security of the Tor service remains intact. One top-secret presentation, titled 'Tor Stinks', states: "We will never be able to de-anonymize all Tor users all the time." It continues: "With manual analysis we can de-anonymize a very small fraction of Tor users," and says the agency has had "no success de-anonymizing a user in response" to a specific request.
guardian, 04.10.2013
anonymisierung_anti  geheimdienst_au_dsd_asd  geheimdienst_uk_gchq_newtonscradle  geheimdienst_uk_gchq_stuntworm  geheimdienst_uk_gchq_onionbreath  geheimdienst_uk_gchq_mullenize  geheimdienst_us_nsa_tao_eggo  geheimdienst_us_nsa_tao_shortsheet  geheimdienst_us_nsa_ces_mjolnir  geheimdienst_us_nsa_mothmonster  geheimdienst_us_nsa_tao_erin  geheimdienst_us_nsa_upstream  geheimdienst_us_nsa_tao_greatexpectations  geheimdienst_us_nsa_ntoc_ronin  geheimdienst_us_nsa_tao_foxacid  geheimdienst_us_nsa_tao_frugalshot  geheimdienst_us_nsa_tao_eggi  internet_protokoll_http_cookie  itsicherheit_exploit_flaw  itsicherheit_software_browser  itsicherheit_software_server  itsicherheit_computing_cloud  land_usa  land_uk  land_australien  software_browser_firefox  software_browser_allg_plugin_flash  software_javascript  überwachung_fingerprint_software  überwachung_identifizierung_itk_nutzer  überwachung_internet_cloud  überwachung_internet_dpi  überwachung_internet_mitm  überwachung_internet_tracking  überwachung_internet_trafficanalyse 
october 2013 by kraven
view in context