It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Anonymous Jihad

page: 1
2

log in

join
share:

posted on Jul, 1 2013 @ 01:16 PM
link   
I wonder if the Tor network has a backdoor ?
People think its untraceable based on the routing protocol and levels of encryption. It might be difficult but not impossible to track and trace someone. With the current computing power and whats being setup in UTAH, it will speed the process a bit. Yet another way to push the 'herd' of violators to a different network?
Not sure.


Jihadists are seeking out more secure methods of online communications, including an avenue created by the U.S. government and financed by American taxpayers, in the wake of revelations about the U.S. monitoring of online messages.

The Tor network has become a go-to means for jihadists and criminals to communicate, raise money, and buy and sell illicit goods and services without fear of being identified or traced by intelligence or law enforcement officials.

The network uses technology called “onion routing” (Tor is an acronym for The Onion Router), which refers to layers of encryption that prevent governments or other users from obtaining information about users or websites hosted on the network.

Tor uses volunteers’ computers to route traffic through thousands of “nodes” worldwide, obscuring users’ locations and the sources of data hosted on the network. The technology makes it nearly impossible to trace or identify the network’s roughly 500,000 daily users.

The U.S. Naval Research Laboratory created Tor in the 1990s. The network was used as a means to circumvent regimes that censor or block their citizens’ online communications. It is a useful tool for whistleblowers and dissidents who risk retribution by repressive governments.

Tor continues to receive about 80 percent of its funding from federal agencies, including the State Department, the National Science Foundation, and the Broadcasting Board of Governors. None of those agencies returned requests for comment.


SOURCE
edit on 1-7-2013 by hp1229 because: (no reason given)



posted on Jul, 1 2013 @ 02:49 PM
link   
reply to post by hp1229
 

yes, Tor is not that reliable. I remember once a foreign country could detect a culprit in the middle of USA. He was amazed because he had used Tor or something like that !



posted on Jul, 1 2013 @ 02:50 PM
link   
reply to post by hp1229
 


Maybe if you stopped wiping out villages with drones the 'jihadists' would leave you alone.



posted on Jul, 1 2013 @ 03:25 PM
link   

Originally posted by DPrice
reply to post by hp1229
 


Maybe if you stopped wiping out villages with drones the 'jihadists' would leave you alone.


If they stopped now it would be worse.



posted on Jul, 1 2013 @ 03:36 PM
link   

Originally posted by yourmaker

Originally posted by DPrice
reply to post by hp1229
 


Maybe if you stopped wiping out villages with drones the 'jihadists' would leave you alone.


If they stopped now it would be worse.


So by blowing up innocent bystanders what do you expect for them to feel like?
Thank you for killing their family and maiming people?
Instead of bombs send food,clothing,fresh drinking water,medicine,aid etc.
But alCIAda and MIC won't do that. Because they want to incite violence and legitimize extremists groups.



posted on Jul, 1 2013 @ 03:48 PM
link   
reply to post by hp1229
 


Tor helps with normal people spying on you not government professionals. DoD,NSA,CIA,FBI and several private contractors can still spy on you. All they have to do is call your isp and request your records. National security blamo all your records in no time.
It just makes it harder for some idiot wannabe spy goon to spy on your personal emails and such.

The government has backdoors and secret spyware ICs (like smart meters and the cisco chinese security exploit) built into your electronics. Tor isn't going to magically remove those spy ICs,secret monitoring trojans, or RATs or backdoors that they can dial into anytime they want. Remember PRISM? ECHELON? Utah data center? regional fusion centers? NDAA? Patriot Act?

Even professional hackers don't use stuff like that by itself and claim to be safe from the feds.



posted on Jul, 1 2013 @ 04:44 PM
link   

Originally posted by John_Rodger_Cornman

Originally posted by yourmaker

Originally posted by DPrice
reply to post by hp1229
 


Maybe if you stopped wiping out villages with drones the 'jihadists' would leave you alone.


If they stopped now it would be worse.


So by blowing up innocent bystanders what do you expect for them to feel like?
Thank you for killing their family and maiming people?
Instead of bombs send food,clothing,fresh drinking water,medicine,aid etc.
But alCIAda and MIC won't do that. Because they want to incite violence and legitimize extremists groups.


Both sides are completely delusional.



posted on Jul, 1 2013 @ 05:31 PM
link   
reply to post by yourmaker
 


Why are they delusional?

Explain.



posted on Jul, 2 2013 @ 02:16 AM
link   
Its amazing, sometimes i read stuff like this and i just can't stop laughing. Its not so much what people don't know about TOR but what they think they do know. Its kind of like watching your mom or grandpa explain to you how the internet works, its just too funny.



posted on Jul, 2 2013 @ 09:37 AM
link   

Originally posted by Superhans
Its amazing, sometimes i read stuff like this and i just can't stop laughing. Its not so much what people don't know about TOR but what they think they do know. Its kind of like watching your mom or grandpa explain to you how the internet works, its just too funny.
Precisely my point. Ever watched the documentaries on how a pack of wild dogs or lions in africa hunt?



posted on Jul, 2 2013 @ 09:39 AM
link   

Originally posted by DPrice
reply to post by hp1229
 
Maybe if you stopped wiping out villages with drones the 'jihadists' would leave you alone.
I agree upto certain extent. However thats a different subject. I'm trying to discuss the specific network and its reliability.



posted on Jul, 2 2013 @ 09:44 AM
link   

Originally posted by John_Rodger_Cornman

Originally posted by yourmaker

Originally posted by DPrice
reply to post by hp1229
 


Maybe if you stopped wiping out villages with drones the 'jihadists' would leave you alone.


If they stopped now it would be worse.


So by blowing up innocent bystanders what do you expect for them to feel like?
Thank you for killing their family and maiming people?
Instead of bombs send food,clothing,fresh drinking water,medicine,aid etc.
But alCIAda and MIC won't do that. Because they want to incite violence and legitimize extremists groups.
Thats all fine and makes sense ideally. However lets talk a bit about who the TOR users might be from the groups representing the islamic fronts and from which regions of the world.



posted on Jul, 2 2013 @ 01:48 PM
link   
Well TOR is very reliable and safe to a point. Keep in mind though many people who take the time to set up and run exit nodes stay true to data love. But some operators do sniff their exits and play big brother on them.




top topics



 
2

log in

join