i'm a devif tor not use it is nsa can spy torif not 2 key 1 for encript and 1 
for decript not workanyone and someone have encript key anyone and someone  
encript and send to user via torthe user have decript keyand receive the code 
encript via torand decrypt they

i  search "open source" and look this after is line is quote.NSA says it only 
gathers such data for "valid foreign intelligence purposes."by Cyrus Farivar - 
July 3 2014, 3:40pm HBNATIONAL SECURITY35 Enlarge  / The structure of a 
three-hop Tor circuit.NSA LEAKSNew Snowden docs: NSA spies on pretty much 
everyone abroadPakistan, Iran, and… USA? New heatmap shows where NSA hacksWhat 
the NSA can (and can’t) mine from intercepted photosSnowden complained about 
mass surveillance tactics to his NSA mastersNSA loves The Bahamas so much it 
records all its cellphone callsView all…Two Germany-based Tor Directory 
Authority  servers, among others, have been specifically targeted by the 
National Security Agency’s XKeyscore program, according to a new report  from 
German public broadcaster ARD. Tor  is a well-known open source project 
designed to keep users anonymous and untraceable—users' traffic is encrypted 
and bounced across various computers worldwide to keep it hidden.This marks the 
first time that actual source code  from XKeyscore has been published. ARD did 
not say how or where it obtained the code. Unlike many other NSA-related 
stories, the broadcaster did not specifically mention the information being 
part of the trove leaked by whistleblower Edward Snowden.XKeyscore is one of 
the high-level NSA surveillance programs that have been revealed via Snowden 
over the last year. The interface allows NSA and allied intelligence agencies 
to search all kinds of short-term data captured directly off of various 
Internet Exchanges worldwide.This new code, which was published on Thursday, 
appears to flag people who are believed to live outside the United States and 
who request Tor bridge information via e-mail or who search for or download Tor 
or the security-minded TAILS operating system . Those users' IP addresses can 
then be tracked for further monitoring.The report’s authors include Jacob 
Appelbaum, a well-known American computer security researcher who has taken up 
residence in Berlin. Appelbaum is also a paid employee of the Tor Project. Two 
others listed as authors are either contractors or volunteers to Tor.“Their 
research in this story is wholly independent from the Tor Project and does not 
reflect the views of the Tor Project in any way,” ARD stated in a disclosure. 
“During the course of the investigation, it was further discovered that an 
additional computer system run by Jacob Appelbaum for his volunteer work with 
helping to run part of the Tor network was targeted by the NSA. Moreover, all 
members of this team are Tor users and appear to be have been targets of the 
mass surveillance described in the investigation.”FURTHER READINGBUILDING A 
PANOPTICON: THE EVOLUTION OF THE NSA’S XKEYSCOREHow the NSA went from 
off-the-shelf to a homegrown "Google for packets."The code specifically cites 
IP addresses of the Tor Directory Authority—these servers act as the nine 
high-level control points that make up the backbone of the Tor Network. These 
authorities are what keep track of new Tor relays, and they are updated every 
hour.Tor was originally developed as part of the Onion Routing project at the 
US Naval Research Laboratory . While today it exists as an independent 
nonprofit organization headquartered in Massachusetts, it still receives 60 
percent of its income  (PDF) from US government sources. Tor is used by 
journalists, law enforcement, military officers, and activists 
worldwide.Another rule in the published code shows that the NSA is also 
targeting users of an anonymous e-mail program called MixMinion , which is 
hosted on a server at the Massachusetts Institute of Technology. Roger 
Dingledine, who is the head of the Tor Project, also runs this MixMinion 
server.Vanee Vines, the spokeswoman for the NSA, responded to Ars' request for 
comment with the same statement that she provided to ARD:In carrying out its 
mission, NSA collects only what it is authorized by law to collect for valid 
foreign intelligence purposes—regardless of the technical means used by foreign 
intelligence targets. The communications of people who are not foreign 
intelligence targets are of no use to the agency.In January, President Obama 
issued U.S. Presidential Policy Directive 28 , which affirms that all 
persons—regardless of nationality—have legitimate privacy interests in the 
handling of their personal information, and that privacy and civil liberties 
shall be integral considerations in the planning of U.S. signals intelligence 
activities.The president's directive also makes clear that the United States 
does not collect signals intelligence for the purpose of suppressing or 
burdening criticism or dissent, or for disadvantaging persons based on their 
ethnicity, race, gender, sexual orientation, or religion.XKeyscore is an 
analytic tool that is used as a part of NSA's lawful foreign signals 
intelligence collection system. Such tools have stringent oversight and 
compliance mechanisms built in at several levels. The use of XKeyscore allows 
the agency to help defend the nation and protect U.S. and allied troops 
abroad.All of NSA's operations are conducted in strict accordance with the rule 
of law, including the President's new directive.
                                                                                
                                          
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to