Find a Question:
NSA focuses on online on Tails of Tor Search
The suspected plug-in source code for an analysis system that the NSA used to gather, internet data would make that the espionage service specifically aimed at users and those interested in anonymizing software like Tor and Tails.
It would be a plug-in associated with NSAs large and complex system XKeyscore whose existence by Snowden documents leaked. The U.S. spy agency would use XKeyscore to wade through. Worldwide gathered data and metadata In a note should state that to consider other users and Tor anonymizing software and services as extremists. At the source code of the plug-in Who where would enter the world as the name of the ‘anonymous OS’ Tails in would be marked by XKeyscore and additional monitored.
According to a source from Boing Boing who was involved in analyzing the Snowden documents, the purpose of the NSA to distribute online users into two groups: users who have the technical knowledge to access the Internet anonymously, and those who have not. The desire of the espionage service would be to completely intercept. Communicating the first group
In the source code of the plug-in on German IP addresses would stand, claiming NDR and ZDF, who claim to have. had access to the source code One of the IP addresses could belong to a server of the German student Sebastian Hahn. This developer is one of the driving forces behind the network for internet anonymously and he runs under another one of the nine directory authorities: central servers where clients lists of all Tor relays with certificates from these countries. The code name for the server, Gabelmoo would be found in the source code, like the code names of the other eight directory Authorities. Underneath is a Dutch server codenamed dizum.
The XKeyscore plugin could filter which uses the Tor network. Using the servers Details probably not obtain the service load: from previous Snowden documents revealed that the NSA is not able to trace only detours anonymous users of the Tor network in a direct way.
However, the service would not only metadata but also the content of e-mails sent via Tor can intercept, so say NDR and ZDF to draw. From source It would go to the line of code ‘”email_body (https://bridges.torproject.org/’: c + + extractors”.Viewing:-256
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!