It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Publisher's description of Torpark 18.104.22.168 From XeroBank: Torpark is a portable browser originally forked from Portable Firefox Web browser with access Tor built into it. Torpark is also upgradable to high speed anonymity services offered by Torrify. Torpark is designed for use on portable media such as a USB flash drive but it can also be used on any hard disk drive. As such, a secure and encrypted connection to any of the Tor routers can be created from any computer, and the browser clears all data that was created on the portable drive upon exit or on demand.
The activist siphoned more than a million documents as they traveled across the internet through Tor,
Under Tor’s architecture, administrators at the entry point can identify the user’s IP address, but can’t read the content of the user’s correspondence or know its final destination. Each node in the network thereafter only knows the node from which it received the traffic, and it peels off a layer of encryption to reveal the next node to which it must forward the connection.
By necessity, however, the last node through which traffic passes has to decrypt the communication before delivering it to its final destination. Someone operating that exit node can therefore read the traffic passing through this server.
According to The New Yorker, “millions of secret transmissions passed through” the node the WikiLeaks activist operated — believed to be an exit node. The data included sensitive information of foreign governments.
The activist believed the data was being siphoned from computers around the world by hackers who appeared to be in China and who were using the Tor network to transmit the stolen data. The activist began recording the data as it passed through his node, and this became the basis for the trove of data WikiLeaks said it had “received.”