NSA's XKeyscore Source Code Leaked! Shows Tor Users Classified As 'Extremists'
from the peeling-away-the-layers dept
We learnt about the NSA’s XKeyscore program a year ago, and about its incredibly wide reach. But now the German TV stations NDR and WDR claim to have excerpts from its source code. We already knew that the NSA and GCHQ have been targeting Tor and its users, but the latest leak reveals some details about which Tor exit nodes were selected for surveillance — including at least one in Germany, which is likely to increase public anger there. It also shows that Tor users are explicitly regarded as “extremists” (original in German, pointed out to us by @liese_mueller):
The source code contains both technical instructions and comments from the developers that provide an insight into the mind of the NSA. Thus, all users of such programs are equated with “extremists”.
Such is the concern about Tor that even visitors to Tor sites — whether or not they use the program — have their details recorded:
not only long-term users of this encryption software become targets for the [US] secret service. Anyone who wants to visit the official Tor Web site simply for information is highlighted.
The source code also gives the lie to the oft-repeated claim that only metadata, not content, is gathered:
With the source code can be proven beyond reasonable doubt for the first time that the NSA is reading not only so-called metadata, that is, connection data. If emails are sent using the Tor network, then programming code shows that the contents — the so-called email-body — are evaluated and stored.
As well as all this interesting information, what’s important here is that it suggests the source of this leak — presumably Edward Snowden, although the German news report does not name him — copied not just NSA documents, but source code too. As in the present case, that is likely to provide a level of detail that goes well beyond descriptive texts.
Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+
Filed Under: content, extremists, gchq, metadata, nsa, source code, surveillance, tor, xkeyscore
Comments on “NSA's XKeyscore Source Code Leaked! Shows Tor Users Classified As 'Extremists'”
O wow.. I’m an extremist O_O
Who else here is an extremist?
Does this make Techdirt a terrorist/extremist group? (NSA generalization says everybody here is now a potential target ;D)
Re: Re:
Count me in!
Re: Re:
I’ve used tor before, I guess that makes me an extremist. What’s more I’m Palestinian (though I’m not Muslim) so that’s two out of three.
Re: Re: Re:
Oh, come on. You ought to know by now that being Palestinian means that you’re a double-whammy worst-of-the-worst bad person. ‘Murica!
Re: Re: Re:
I don’t think the NSA believes in the existence of non-Muslim Palestinians. So don’t worry, they’re counting you as 3/3.
Re: Re: Re: Re:
To be fair since you’re responding to an extremist they will classify you as one too.
Re: Re: Re:2 Re:
And by extension so are you!
Re: Re:
Everyone here is an Extremist!
All of their definitions are so damn broad that is the only classification left that applies. Including our elected officials.
Re: Re: Re:
There is an exemption for elected officials, at least the corrupt ones. Being an honest person is considered extreme while being a corrupt politician bought by corporations is considered normal.
Re: I've got you all beat
Not only do I run a Tor relay, but I’ve written open source code that uses encryption and I’ve posted anonymous comments that make fun of the NSA. To add icing to the cake, one time, I had a missed call on my cell phone and it had a country code of Egypt on it.
So I’m sure I’m now considered a valid selector by the NSA. And thanks to Obama’s two hop rule, by downloading this comment you are now a valid target to have all your email downloaded, read, processed and saved for later use by the government as they see fit.
Re: Re:
Re: Re: Re:
Aha, true enough!
Re: Re:
The first rule of extremist club: don’t talk about extremist club.
Re: Re:
Probably as according to Cory Doctorow just looking up anything about TOR makes you an extremist, so they probably consider Techdirt a hotbed of extremists, as it has discussed TOR etc.
Re: Re:
I went there once to see what it was. Guess I am extreme.
Re: Re: Re:
Ditto that. And I used my work computer, too.
Re: Re:
At least TD readers are aware of the issues. But I do feel bad for people like Ty Pennington, snowboarders, anyone who eats Doritos…
Re: Re:
I’ve been in rooms in church basements full, just packed, with extremists!! These are Alcoholics Anonymous where some newbies take the Anonymity clause to ridiculous extremes and so use Tor as their way of maintaining their anonymity while on line! Though they’ll stay members pf Facebook! Which we all know is just packed with extremists!
I'm the oldest one!
I’m a 61 yr old tor exit node operator! Now I have an FBI file and an NSA file!!! I’m SO proud!!!!
Let’s all run out to wally world, grab a cheap laptop, toss a tor exit node on it, and fire it up. Let’s see how many we can get going here!
Re: I'm the oldest one!
You need a handle! How about Black Fire? Wax Man? Pink Oboe? Mister Six? The Cultural Reference?
Re: Re: I'm the oldest one!
Ooh, Ooh, I call overweight white guy in the suburbs. Or OWIGITS for short.
Re: Re: I'm the oldest one!
He needs the name WANG FIRE! Because nothing is epic without WANG FIRE!
Re: Re: Re: I'm the oldest one!
And his wife, Saph Fire.
Re: Re: I'm the oldest one!
Cemetery Wind has a nice right to it!
Please people, keep using Tor and claiming it’s secure…
Re: Re:
Well, if they are just targeting exit nodes and don’t have both your entry and exit nodes compromised, as long as you aren’t using any personally identifying information (obvious ones like name and address, and non-obvious ones like user-agent, headers, and cookies) you are still fine and anonymous. They can see what you are doing, but not who you are.
As long as you are careful about how you are using TOR, it is still safe. That is until the NSA has all 3 of your nodes compromised…
A big caveat for the NSA though – while they may be able to compromise a few nodes here and there or set up a bunch of fake nodes, it is such a big network that it would be very unlikely to have both your entry and exit node at the same time. Plus, you can simply change your route through the TOR network with a single click, which should be done often anyway. 5 or 10 years from now, who knows…
Always treat TOR like you are being monitored and are already compromised. Switch routes frequently, never use the same user-agent, always rotate through names/accounts, never allow JS and always make sure cookies are cleared out and sessions are closed after every single use.
Plus, you can always use proxy-chains and go through a VPN before entering TOR – it doesn’t slow you down at all since TOR is always slower than a VPN.
Re: Re: Re:
Oh really?
https://cpunks.org//pipermail/cypherpunks/2014-July/004922.html
Re: Re: Re: Re:
What’s your point there? All I see are unsubstantiated claims.
Re: Re: Re:2 Re:
In that case, I would suggest you look further than you previously have. I will not look for you.
Re: Re: Re:3 Re:
I, for one, always try to look further than I previously have. But I will not chase your ball into the weeds.
Re: Re: Re:4 Re:
Suit yourself. Just remember, there are things hiding in the weeds you should be aware of.
Re: Re:
Tor all by itself doesn’t really help that much from a security standpoint.
Tor on windows borders on futile. You can be exploited so many other ways.
The only way to approach security(if you really care) is holistically. Start with a secure OS from a trusted source, and build up from there. The tails project is a good way to achieve this without too much effort.
GitHub, anyone?
I’d be interested in seeing the source code put in a git repository in order to comb it over for potential flaws
Re: GitHub, anyone?
Here is the core routine:
bool isExtermest(std::string name) {
if (name != “John Smith”) {
return true; // Not an american.
}
if (name == “John Smith”) {
return true; // Obviously hiding something.
}
// Lots of irrelevant code.
return false;
}
Re: Re: GitHub, anyone?
I fixed that inefficient code for you, this will do what you want.. ()
bool isExtremist(std::string name) {
return true;
}
( efficiency is important here after all, we can’t waste processor cycles when we’re processing everyone on the darned planet and in orbit around it, and we have built in capability for processing non-earth aliens by not using human characteristics as determinants)
Snowden really Tor them a new a**hole with this leak.
Re: Re:
That was Toriffic!
Re: Re: Re:
I think you meant Torrible.
Re: Re: Re: Re:
That one was a little tortured.
Re: Re: Re:2 Re:
there’s no need to Torpedo the guy for making a bad pun.
Re: Re: Re:3 Re:
Why do all of you insist on tormenting me so?
Re: Re: Re:4 Re:
Truthfully, I was torn about even bringing it up.
Re: Re: Re:4 Re:
Please, don’t get swept up in this tornado of negativity.
Re: Re: Re:5 Re:
I’m now torn between reading the Torah and filing a tort suit for intentional infliction of emotional distress.
Re: Re: Re:6 Re:
Contorted, I see.
Re: Re: Re:6 Re:
Or you could just BitTorrent a torrid little film to watch.
Re: Re:
Nowhere does it say that this leak came from Snowden. It’s possible. But it’s just as likely that someone else has stepped up and leaked this in the wake of all that has happened. Still we can expect to see Roger’s shooting his mouth off with all kinds of unsubstantiated allegations this weekend.
Re: Re: Re:
First, the likelihood of another NSA employee or contractor leaking something like this right now? Snowden is very likely the source.
Second – are you really trying to start up a real conversation on my bad “tor” pun thread?
Re: Re: Re: Re:
2. I didn’t really mean to divert your pun torrent either.
Re: Re: Re: Re:
This doesn’t fit with previous content leaked from the Snowden cache. I believe there’s a second leaker involved in this. Every article I’ve seen which cited a Snowden leak was conspicuously labeled as such. Why wouldn’t that be the case here?
Re: Re: Re: Re:
Actually I think it’s easier to leak stuff right now, as Snowden will get the blame no-matter who the leaker is.
Re: Re: Re:
Whoever it is – this could be the start of something huge. I wonder what other pieces of source code they may have absconded. Encryption/decryption routines? Exploits created in-house?
Re: Re:
The idea of a second leaker is getting some traction. Bruce Schneier and Cory Doctorow both think this did not come from the Snowden docs.
if BRL-CAD is free because it is a public work
why isn’t xkeyscore?
Re: if BRL-CAD is free because it is a public work
because TERRORISTS!!!!!
Re: Re: if BRL-CAD is free because it is a public work
I thought it was : “because TorRORISTS!!!!!“
If Tor users are extremists,
what does that make the NSA?
Re: If Tor users are extremists,
freedom fighters
Re: Re: If Tor users are extremists,
fighting against freedom, you mean ? ? ?
you got that right…
Re: Re: freedom fighters
I have to agree. Within the US, NSA does work hard to fight against freedom.
Re: Re: Re: freedom fighters
I was going to replace “US” with “world”, but then I realized those are basically the same thing to the USG
Re: Re: If Tor users are extremists,
You mean like how fire fighters fight fire right?
Suggestion for a secure PC & Internet in times of surveillance scandal
• Operating system: https://tails.boum.org/ (used by Snowden; free software, which tunnels all internet traffic automatically through the TOR network, and which surface can look like the surface of Windows 8 or XP)
• + https://freenetproject.org (most secure anonymous filesharing software, which exists so far)
Regarding software the most important thing is to use a secure operation system; it’s the fundament for everything, which you do with a PC regarding software. So it’s a weakness, if on the one hand one relies on programs like the freenet project or TOR, but on the other hand does so on foundation of windows, which has a direct wire to the NSA.
Re: Suggestion for a secure PC & Internet in times of surveillance scandal
Heads up. There hasn’t been a version of Tails yet that doesn’t phone home in some manner. In the beginning, their justification for the behavior was to “count” Tails users. Now, many versions down the line, it’s automatically “checking for updates”. You cannot defeat this with any setting, although you could certainly hex-edit the executable, and burn a new iso (recommended).
This inexorable connection to boum.org, in and of itself, is a red-flag pointing to Tails usage.
given their behavior
If a Tor user is an extremist, I have no doubt that they would call the Bill of Rights authors full blown terrorists.
Re: given their behavior
Re: Re: given their behavior
Oh nothing so large-scale I’m sure, as soon as they started to look like they were trouble-makers, they’d have been scooped up, black bagged, and disappeared in a cell somewhere.
Re: given their behavior
Apparently they were extremists as well. …at least according to the DoD.
0_o
Next thing you know
New NSA leak, anyone associated with Techdirt is an extremist.
Re: Next thing you know
Dark Helmet is a double agent.
mmm
I not only use Tor but develop a version of it that is in wide distribution.
God only knows now what they have no me.
Re: mmm
Literally everything.
Ever seen the contents of a full background check? Now add in everything you’ve ever posted online, posted near you online, or referred to anything you’ve ever even viewed online.
The extremists are the ones who say “anything is permissible” in the fight against what ever it is they are fighting. that is probably the number one hallmark of extremism. So on that basis I put NSA and Al Qaeda in the same bin.
Re: Re:
So the extremists are the Assassins from Assassin’s Creed? Everything is permitted?
Does that make the NSA the Templars?
Whatever is an extremist
Hey whatever how does it fell knowing that you are classified as an extremist by those you support?
Re: Whatever is an extremist
Was going to post this, but someone beat me to the punch.
Obviously Whatever is fine with it, because all copyright/NSA fanboys are masochists by nature. How else could they loudly and proudly claim more copyright extensions and surveillance betters culture and society, while still keeping a poker face?
Re: Whatever is an extremist
Agreed. Couldn’t have happened to a nicer asshole.
At this point...
…if you’re not being classified as an extremist by the NSA, you’re doing something wrong.
Well, since we're already extremists...
It’s high time we all started learning how to make bombs.
I mean, you never know when that kind of thing will be handy, as an extremist.
I am an extremist
time to behave like one!
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC
So wait
If I post the link to the Tor homepage, am I giving material aid to terrrrrists? Also, would the NSA classify Googlebot as a person of interest when it follows said link?
Oldie, but a Goody
Tora, Tora, Tora!!
(will this put the MPAA on the extremist list?)
http://www.imdb.com/title/tt0066473/
Kafka called...
The unbelievable irony of the NSA calling Tor users ‘extremists’ – the USG provides 80% of the funding for Tor(1)… so does that make the rest of the Gov’t extremists too?
————-
Fowler, Geoffrey A. (17 December 2012). Tor: An Anonymous, And Controversial, Way to Web-Surf. Wall Street Journal. Retrieved 3 July 2014
Re: Kafka called...
No. In their view, they’re providing you rope in the hopes you will hang yourself (so to speak).
Re: Kafka called...
I’d say it makes them a state sponsor of Torrorism.
Next they’ll be arguing in court that because it’s so government-funded, users have no expectation of privacy!
We’re all extremists! The more the merrier I guess!
I didn’t realize I was an extremist. I guess now I have to breed terriers and start listening to Abba.
So curiosity suicide-bombed the cat then?
The source code comments left by these NSA spying extremists, provides us with a clear picture into the culture and mindset of radical NSA spying fanatics.
Under the enemy expatriation act ( H.R. 3166 and S. 1698)the US government can strip a US citizen of their citizenship and their rights if they are classified as a terrorist.
So what makes a citizen a terrorist, anything and everything these days.
If you visit sites that preach dissent against any form of government misconduct congrats your a terrorist. If you protest anything peaceful or violent, your a terrorist. If you question your government over anything again your labelled a terrorist.
Just look at the NDA to see extreme examples of how “national security” trumps the constitution.
Extremely extremist sensitive
I would be interested to know if there is even one single person in the whole wide world, that NSA would not list as an extremist. (Assuming there are any it hasn’t already listed.)
Re: Extremely extremist sensitive
The President at the time. Him/her ever be an extremist or violate the law? Un-possible!
From now on I will make TOR my landing site, and TAILS my Main O/S
In defiance, I am not using anonymous name:
From now on I will make TOR my landing site, and TAILS my Main Linux O/S.
Now Good luck NSA be my daily guest!
jokers.....
common,
this is not the xkeyscore code. everyone who works with this kind of data knows, this is only a selector for something but nothing more.
do you realy believe the sourcecode for xkeyscore is somewhere on the table ? even, this short piece of code is never ever “The xkeyscore sourcecode”.
…..
over and out
I am an extreme terrorist!
Not just interested in encryption...
So let’s see…the news articles claim the NSA is interested in people who are interested in encryption or Tor.
Well, according to the code snippet at NSA Targets the Privacy-Conscious for Surveillance, it goes just a bit beyond that…
In fact, NSA captures every web search containing one of these words: “linux”, “USB”, “CD”, “IRC” (Internet Relay Chat). They also capture anyone who goes to any article whatsoever that begins with “http://linuxjournal.com/content/linux”. Does that sound like “interested in encryption” to you?
This fits right in with my ideas of the NSA: When they claim they want x, they just capture everything and keep it all. If challenged, they say something like, “No, really, we were only interested in ‘x’.”
Should we believe that? When, in this case, they capture every web search that contains the words above, whether it involves encryption or not?
Re: Not just interested in encryption...
Sigh. I read the code wrong, with respect to the words list. The words must appear in combination with either the word “tails” or term “Amnesiac Incognito Live System”. So it’s not quite as sensitive to the words as I believed.
It is sensitive to all the linuxjournal.com articles matching the lead-in, though.
hay
HAY! I never used this tor before. My bro says it’s for downloading stuff without paying for it. So I bet the bums in corporatism are behind this. Imagine how many people they will send to jail for just being cheap bastards who can’t wait for it to come out on Netflix.
Isn’t Germany where NewsCorp found someone to make code to help folks download card codes for their competitors’ TV satellite services? So that’s sort of like tor, passing around the pirated shite, but hoping it kills the competition at the same time.
Did you catch that criminal activity, NSA? Have you redeployed it?
Germany is perfectly placed to pie face the Five Eyes.
David Cameron’s email in Rebekah Brooks’ BlackBerry was reported to the Leveson court to have lost its content after spending three weeks in police custody. The other email had text, so my bet is that’s David’s Tempora file well passed it’s sellbuy date, gone meta after 30 days. Who’s the Rose Mary Woods this time? Home Secretary. GCHQ, you silly beans.
Give Cameron what he deserves, a big BlackBerry Pie in the facebook, Germany! Your pastry is vastly superior to his.
All this nonsense about Torrorists, is a bunch of bullsqueeze. Can’t we all just be extreme friends?
boss
so lets see, I use tor alot, I use linux, I have tails on usb,
I am a security enthusiastic and most importantly I AM A MUSLIM.
move along kids Boss is here 😉
Hi,I am a extreemeist looking to Tor the Constitution to pieces and blow up the white house
Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house
Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house
Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house
No wonder SkyNet is already here only what is missing is some artificial intelligence on some quantum supercomputer (or it is already running???)! Notorious Pathological Crazy Americans – the whole god damn world is terrorist then ! They are in desperate need for some Aliens otherwise we are screwed up !