I searched and did not see this posted yet. TOR the anonymity service used by many to try and remain secure has been compromised by the NSA and has
been for years apparently.
According to a top-secret NSA summary of the meeting, Dingledine told the assembled NSA staff that his service, called Tor, offered anonymity to
people who needed it badly — to keep business secrets, protect their identities from oppressive political regimes or conduct research without
revealing themselves. In the minds of NSA officials, Tor was offering protection to terrorists and other intelligence targets. As he spoke to the
NSA, Dingledine said in an interview Friday, he suspected the agency was attempting to break into Tor, which is used by millions of people around the
world to shield their identities. Documents provided to The Washington Post by former agency contractor Edward Snowden show that he was right.
Beginning at least a year before Dingledine’s visit, the NSA has mounted increasingly successful attacks to unmask the identities and locations of
users of Tor. In some cases, the agency has succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. In
others, it has been able to “stain” anonymous traffic as it enters the Tor network, enabling the NSA to identify users as it exits. Tor works by
encrypting traffic repeatedly as it flows across a global network of servers, mostly run by volunteers. The traffic, which can include e-mails,
information from a Web site and almost anything else on the Internet, is supposed to arrive at its destination with no identifying information about
its origin or the path it took. The Snowden documents, including a detailed PowerPoint presentation, suggest that the NSA cannot see directly inside
Tor’s anonymous network but that it has repeatedly uncloaked users by circumventing Tor’s protections. The documents also illustrate the power of
the NSA to at least partially penetrate what have long been considered the most secure corners of the Internet.
Noted from the designer of TOR.
DYNAMIC PAGE — HIGHEST POSSIBLE CLASSIFICATION TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Roger Dingledine at NSA NOV 2007 From
PE Contents * 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) o 1.1 (U) Who are TOR Customers? o 1.2 (U) Anonymity
System Concepts o 1.3 (U) TOR Issues (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) (U) Roger Dingledine, now of
Torproject.org, was one of the principle inventors or TOR. Current usage statistics quoted are 200K users and 1K servers. When asked about trends, he
had no concrete data - Being a non-profit open-source effort, the collector of statistics has not been active recently.
From The Guardian article and power point presentation.
Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal that the agency's current successes against Tor rely on identifying
users and then attacking vulnerable software on their computers. One technique developed by the agency targeted the Firefox web browser used with Tor,
giving the agency full control over targets' computers, including access to files, all keystrokes and all online activity. But the documents suggest
that the fundamental security of the Tor service remains intact. One top-secret presentation, titled 'Tor Stinks', states: "We will never be able to
de-anonymize all Tor users all the time." It continues: "With manual analysis we can de-anonymize a very small fraction of Tor users," and says the
agency has had "no success de-anonymizing a user in response" to a specific request. Another top-secret presentation calls Tor "the king of
high-secure, low-latency internet anonymity". Tor – which stands for The Onion Router – is an open-source public project that bounces its users'
internet traffic through several other computers, which it calls "relays" or "nodes", to keep it anonymous and avoid online censorship tools. It is
relied upon by journalists, activists and campaigners in the US and Europe as well as in China, Iran and Syria, to maintain the privacy of their
communications and avoid reprisals from government. To this end, it receives around 60% of its funding from the US government, primarily the State
Department and the Department of Defense – which houses the NSA.
Link to documents. If someone can upload the slides it would be very helpful. I am limited on what I can do as I am using my phone.
'""Peeling back the layers of Tor with EgotisticalGiraffe' – read the document
Selected extracts show how NSA uses a technique with codename EgotisticalGiraffe to attack Tor users through vulnerable software on their
"'Tor Stinks' presentation – read the full document"
Tor: 'The king of high-secure, low-latency anonymity'
Extracts from top-secret NSA document acknowledge the fundamental security of the Tor protection tool and say 'there are no contenders to the throne
NSA and GCHQ target Tor network that protects anonymity of web users
• Top-secret documents detail repeated efforts to crack Tor
• Tool is funded by US government and relied on by dissidents and activists
• Agencies have failed to break core security of network but have limited success in attacking users' computers
Why the NSA's attacks on the internet must be made public
Attacking Tor: how the NSA targets users' online anonymity
'Peeling back the layers of Tor with EgotisticalGiraffe' – read the document
'Tor Stinks' presentation – read the full document"
I suppose you should have known this was coming. There have been many very high profile takedowns of groups using TOR this year. Child porn rings have
been dismantled worldwide that were using TOR to try and acheive anonymity. This week the Drug Site Silk Road which used TOR was taken down as well. I
have never personally used TOR and have no real need to however I understand that there is a very real need by legitimate people to remain anonymous
and have thier locations and identity hidden... I am not for the NSA's continued intrusion into every possible aspect of my life and your life as
well. It is clear the NSA is not just using Prism to protect the Mainland from another. 9-11... It wants unchecked ability to spy on everyone for any
reason at any given time.
There is no where on the Net to remain anonymous or hidden. Big Brother is definitely watching. This is very scary news.
edit on 4-10-2013 by GArnold because: (no reason given)
edit on 4-10-2013 by GArnold because: (no reason
edit on 4-10-2013 by GArnold because
edit on 4-10-2013 by GArnold because: (no reason given)[/editby
4-10-2013 by GArnold because: (no reason given)