Techdirt is off for Memorial Day. We'll be back with regularly scheduled posting tomorrow!Hide

NSA's XKeyscore Source Code Leaked! Shows Tor Users Classified As 'Extremists'

from the peeling-away-the-layers dept

We learnt about the NSA's XKeyscore program a year ago, and about its incredibly wide reach. But now the German TV stations NDR and WDR claim to have excerpts from its source code. We already knew that the NSA and GCHQ have been targeting Tor and its users, but the latest leak reveals some details about which Tor exit nodes were selected for surveillance -- including at least one in Germany, which is likely to increase public anger there. It also shows that Tor users are explicitly regarded as "extremists" (original in German, pointed out to us by @liese_mueller):

The source code contains both technical instructions and comments from the developers that provide an insight into the mind of the NSA. Thus, all users of such programs are equated with "extremists".
Such is the concern about Tor that even visitors to Tor sites -- whether or not they use the program -- have their details recorded:
not only long-term users of this encryption software become targets for the [US] secret service. Anyone who wants to visit the official Tor Web site simply for information is highlighted.
The source code also gives the lie to the oft-repeated claim that only metadata, not content, is gathered:
With the source code can be proven beyond reasonable doubt for the first time that the NSA is reading not only so-called metadata, that is, connection data. If emails are sent using the Tor network, then programming code shows that the contents -- the so-called email-body -- are evaluated and stored.
As well as all this interesting information, what's important here is that it suggests the source of this leak -- presumably Edward Snowden, although the German news report does not name him -- copied not just NSA documents, but source code too. As in the present case, that is likely to provide a level of detail that goes well beyond descriptive texts.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+


Reader Comments (rss)

(Flattened / Threaded)

  1.  
    icon
    Ninja (profile), Jul 3rd, 2014 @ 6:34am

    O wow.. I'm an extremist O_O

    Who else here is an extremist?

    Does this make Techdirt a terrorist/extremist group? (NSA generalization says everybody here is now a potential target ;D)

     

    reply to this | link to this | view in thread ]

  2.  
    icon
    TheResidentSkeptic (profile), Jul 3rd, 2014 @ 7:12am

    I'm the oldest one!

    I'm a 61 yr old tor exit node operator! Now I have an FBI file and an NSA file!!! I'm SO proud!!!!

    Let's all run out to wally world, grab a cheap laptop, toss a tor exit node on it, and fire it up. Let's see how many we can get going here!

     

    reply to this | link to this | view in thread ]

  3.  
    icon
    rw (profile), Jul 3rd, 2014 @ 7:15am

    Re:

    Count me in!

     

    reply to this | link to this | view in thread ]

  4.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 7:46am

    Please people, keep using Tor and claiming it's secure...

     

    reply to this | link to this | view in thread ]

  5.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 7:54am

    GitHub, anyone?

    I'd be interested in seeing the source code put in a git repository in order to comb it over for potential flaws

     

    reply to this | link to this | view in thread ]

  6.  
    identicon
    Michael, Jul 3rd, 2014 @ 7:55am

    Snowden really Tor them a new a**hole with this leak.

     

    reply to this | link to this | view in thread ]

  7.  
    identicon
    alternatives(), Jul 3rd, 2014 @ 7:56am

    if BRL-CAD is free because it is a public work

    why isn't xkeyscore?

     

    reply to this | link to this | view in thread ]

  8.  
    identicon
    Michael, Jul 3rd, 2014 @ 7:58am

    Re: if BRL-CAD is free because it is a public work

    because TERRORISTS!!!!!

     

    reply to this | link to this | view in thread ]

  9.  
    identicon
    Jack, Jul 3rd, 2014 @ 8:05am

    Re:

    Well, if they are just targeting exit nodes and don't have both your entry and exit nodes compromised, as long as you aren't using any personally identifying information (obvious ones like name and address, and non-obvious ones like user-agent, headers, and cookies) you are still fine and anonymous. They can see what you are doing, but not who you are.

    As long as you are careful about how you are using TOR, it is still safe. That is until the NSA has all 3 of your nodes compromised...

    A big caveat for the NSA though - while they may be able to compromise a few nodes here and there or set up a bunch of fake nodes, it is such a big network that it would be very unlikely to have both your entry and exit node at the same time. Plus, you can simply change your route through the TOR network with a single click, which should be done often anyway. 5 or 10 years from now, who knows...

    Always treat TOR like you are being monitored and are already compromised. Switch routes frequently, never use the same user-agent, always rotate through names/accounts, never allow JS and always make sure cookies are cleared out and sessions are closed after every single use.

    Plus, you can always use proxy-chains and go through a VPN before entering TOR - it doesn't slow you down at all since TOR is always slower than a VPN.

     

    reply to this | link to this | view in thread ]

  10.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:10am

    Re:

    I've used tor before, I guess that makes me an extremist. What's more I'm Palestinian (though I'm not Muslim) so that's two out of three.

     

    reply to this | link to this | view in thread ]

  11.  
    icon
    orbitalinsertion (profile), Jul 3rd, 2014 @ 8:23am

    If Tor users are extremists,

    what does that make the NSA?

     

    reply to this | link to this | view in thread ]

  12.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:27am

    Re:

    Everyone here is an Extremist!

    All of their definitions are so damn broad that is the only classification left that applies. Including our elected officials.

     

    reply to this | link to this | view in thread ]

  13.  
    icon
    Beta (profile), Jul 3rd, 2014 @ 8:30am

    Re: I'm the oldest one!

    You need a handle! How about Black Fire? Wax Man? Pink Oboe? Mister Six? The Cultural Reference?

     

    reply to this | link to this | view in thread ]

  14.  
    identicon
    Keyboard-Rider, Jul 3rd, 2014 @ 8:30am

    Suggestion for a secure PC & Internet in times of surveillance scandal

    • Operating system: https://tails.boum.org/ (used by Snowden; free software, which tunnels all internet traffic automatically through the TOR network, and which surface can look like the surface of Windows 8 or XP)
    • + https://freenetproject.org (most secure anonymous filesharing software, which exists so far)

    Regarding software the most important thing is to use a secure operation system; it's the fundament for everything, which you do with a PC regarding software. So it's a weakness, if on the one hand one relies on programs like the freenet project or TOR, but on the other hand does so on foundation of windows, which has a direct wire to the NSA.

     

    reply to this | link to this | view in thread ]

  15.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:32am

    Re:

    That was Toriffic!

     

    reply to this | link to this | view in thread ]

  16.  
    identicon
    mcinsand, Jul 3rd, 2014 @ 8:33am

    given their behavior

    If a Tor user is an extremist, I have no doubt that they would call the Bill of Rights authors full blown terrorists.

     

    reply to this | link to this | view in thread ]

  17.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:37am

    Next thing you know

    New NSA leak, anyone associated with Techdirt is an extremist.

     

    reply to this | link to this | view in thread ]

  18.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:39am

    Re: Re:

    There is an exemption for elected officials, at least the corrupt ones. Being an honest person is considered extreme while being a corrupt politician bought by corporations is considered normal.

     

    reply to this | link to this | view in thread ]

  19.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:41am

    mmm

    I not only use Tor but develop a version of it that is in wide distribution.

    God only knows now what they have no me.

     

    reply to this | link to this | view in thread ]

  20.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:42am

    Re: I've got you all beat

    Not only do I run a Tor relay, but I've written open source code that uses encryption and I've posted anonymous comments that make fun of the NSA. To add icing to the cake, one time, I had a missed call on my cell phone and it had a country code of Egypt on it.

    So I'm sure I'm now considered a valid selector by the NSA. And thanks to Obama's two hop rule, by downloading this comment you are now a valid target to have all your email downloaded, read, processed and saved for later use by the government as they see fit.

     

    reply to this | link to this | view in thread ]

  21.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:44am

    Re: Re: I'm the oldest one!

    Ooh, Ooh, I call overweight white guy in the suburbs. Or OWIGITS for short.

     

    reply to this | link to this | view in thread ]

  22.  
    identicon
    Michael, Jul 3rd, 2014 @ 8:47am

    Re: If Tor users are extremists,

    freedom fighters

     

    reply to this | link to this | view in thread ]

  23.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:47am

    Re: Re: I'm the oldest one!

    He needs the name WANG FIRE! Because nothing is epic without WANG FIRE!

     

    reply to this | link to this | view in thread ]

  24.  
    icon
    art guerrilla (profile), Jul 3rd, 2014 @ 8:49am

    Re: Re: If Tor users are extremists,

    fighting *against* freedom, you mean ? ? ?
    you got that right...

     

    reply to this | link to this | view in thread ]

  25.  
    icon
    Seegras (profile), Jul 3rd, 2014 @ 8:50am

    Re:

    > Who else here is an extremist?

    That I wouldn't know. But obviously those guys in the NSA are extremists.

     

    reply to this | link to this | view in thread ]

  26.  
    icon
    Seegras (profile), Jul 3rd, 2014 @ 8:53am

    Re: given their behavior

    > I have no doubt that they would call the Bill of Rights
    > authors full blown terrorists.

    Totally so. If George Washington and Thomas Jefferson were alive today, the US government would have a revolutionary war going against it.

     

    reply to this | link to this | view in thread ]

  27.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 8:53am

    Re: given their behavior

    Apparently they were extremists as well. ...at least according to the DoD.

    0_o

     

    reply to this | link to this | view in thread ]

  28.  
    icon
    BentFranklin (profile), Jul 3rd, 2014 @ 8:55am

    The extremists are the ones who say "anything is permissible" in the fight against what ever it is they are fighting. that is probably the number one hallmark of extremism. So on that basis I put NSA and Al Qaeda in the same bin.

     

    reply to this | link to this | view in thread ]

  29.  
    identicon
    mcinsand, Jul 3rd, 2014 @ 8:58am

    freedom fighters

    I have to agree. Within the US, NSA does work hard to fight against freedom.

     

    reply to this | link to this | view in thread ]

  30.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:01am

    Whatever is an extremist

    Hey whatever how does it fell knowing that you are classified as an extremist by those you support?

     

    reply to this | link to this | view in thread ]

  31.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:01am

    Re: freedom fighters

    I was going to replace "US" with "world", but then I realized those are basically the same thing to the USG

     

    reply to this | link to this | view in thread ]

  32.  
    identicon
    Michael, Jul 3rd, 2014 @ 9:05am

    Re:

    The first rule of extremist club: don't talk about extremist club.

     

    reply to this | link to this | view in thread ]

  33.  
    icon
    Anonsters (profile), Jul 3rd, 2014 @ 9:05am

    Re: Re:

    I think you meant Torrible.

     

    reply to this | link to this | view in thread ]

  34.  
    icon
    Anonsters (profile), Jul 3rd, 2014 @ 9:07am

    Re: Re:

    Oh, come on. You ought to know by now that being Palestinian means that you're a double-whammy worst-of-the-worst bad person. 'Murica!

     

    reply to this | link to this | view in thread ]

  35.  
    identicon
    Ruben, Jul 3rd, 2014 @ 9:16am

    Re:

    Tor all by itself doesn't really help that much from a security standpoint.

    Tor on windows borders on futile. You can be exploited so many other ways.

    The only way to approach security(if you really care) is holistically. Start with a secure OS from a trusted source, and build up from there. The tails project is a good way to achieve this without too much effort.

     

    reply to this | link to this | view in thread ]

  36.  
    identicon
    Michael, Jul 3rd, 2014 @ 9:21am

    Re: Re: Re:

    That one was a little tortured.

     

    reply to this | link to this | view in thread ]

  37.  
    icon
    sorrykb (profile), Jul 3rd, 2014 @ 9:22am

    At this point...

    ...if you're not being classified as an extremist by the NSA, you're doing something wrong.

     

    reply to this | link to this | view in thread ]

  38.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:22am

    Re: Re: Re: Re:

    there's no need to Torpedo the guy for making a bad pun.

     

    reply to this | link to this | view in thread ]

  39.  
    identicon
    tomczerniawski, Jul 3rd, 2014 @ 9:25am

    Well, since we're already extremists...

    It's high time we all started learning how to make bombs.

    I mean, you never know when that kind of thing will be handy, as an extremist.

     

    reply to this | link to this | view in thread ]

  40.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:25am

    Re:

    Probably as according to Cory Doctorow just looking up anything about TOR makes you an extremist, so they probably consider Techdirt a hotbed of extremists, as it has discussed TOR etc.

     

    reply to this | link to this | view in thread ]

  41.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:31am

    Re:

    Nowhere does it say that this leak came from Snowden. It's possible. But it's just as likely that someone else has stepped up and leaked this in the wake of all that has happened. Still we can expect to see Roger's shooting his mouth off with all kinds of unsubstantiated allegations this weekend.

     

    reply to this | link to this | view in thread ]

  42.  
    icon
    Anonsters (profile), Jul 3rd, 2014 @ 9:31am

    Re: Re: Re: Re: Re:

    Why do all of you insist on tormenting me so?

     

    reply to this | link to this | view in thread ]

  43.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:33am

    Re: Re: If Tor users are extremists,

    You mean like how fire fighters fight fire right?

     

    reply to this | link to this | view in thread ]

  44.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:33am

    I am an extremist

    time to behave like one!


    Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

     

    reply to this | link to this | view in thread ]

  45.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:37am

    So wait

    If I post the link to the Tor homepage, am I giving material aid to terrrrrists? Also, would the NSA classify Googlebot as a person of interest when it follows said link?

     

    reply to this | link to this | view in thread ]

  46.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 9:37am

    Re: Re: Re: I'm the oldest one!

    And his wife, Saph Fire.

     

    reply to this | link to this | view in thread ]

  47.  
    identicon
    Varsil, Jul 3rd, 2014 @ 9:40am

    Re: Re:

    I don't think the NSA believes in the existence of non-Muslim Palestinians. So don't worry, they're counting you as 3/3.

     

    reply to this | link to this | view in thread ]

  48.  
    identicon
    Michael, Jul 3rd, 2014 @ 9:47am

    Re: Re:

    First, the likelihood of another NSA employee or contractor leaking something like this right now? Snowden is very likely the source.

    Second - are you really trying to start up a real conversation on my bad "tor" pun thread?

     

    reply to this | link to this | view in thread ]

  49.  
    identicon
    Michael, Jul 3rd, 2014 @ 9:49am

    Re: Re: Re: Re: Re: Re:

    Truthfully, I was torn about even bringing it up.

     

    reply to this | link to this | view in thread ]

  50.  
    identicon
    Ruben, Jul 3rd, 2014 @ 9:49am

    Re: Re: Re: Re: Re: Re:

    Please, don't get swept up in this tornado of negativity.

     

    reply to this | link to this | view in thread ]

  51.  
    identicon
    Michael, Jul 3rd, 2014 @ 9:50am

    Re: Next thing you know

    Dark Helmet is a double agent.

     

    reply to this | link to this | view in thread ]

  52.  
    icon
    Anonsters (profile), Jul 3rd, 2014 @ 10:00am

    Re: Re: Re: Re: Re: Re: Re:

    I'm now torn between reading the Torah and filing a tort suit for intentional infliction of emotional distress.

     

    reply to this | link to this | view in thread ]

  53.  
    identicon
    Digitari, Jul 3rd, 2014 @ 10:12am

    Oldie, but a Goody

    Tora, Tora, Tora!!

    (will this put the MPAA on the extremist list?)

    http://www.imdb.com/title/tt0066473/

     

    reply to this | link to this | view in thread ]

  54.  
    icon
    Jeff (profile), Jul 3rd, 2014 @ 10:13am

    Kafka called...

    The unbelievable irony of the NSA calling Tor users 'extremists' - the USG provides 80% of the funding for Tor(1)... so does that make the rest of the Gov't extremists too?

    -------------
    Fowler, Geoffrey A. (17 December 2012). Tor: An Anonymous, And Controversial, Way to Web-Surf. Wall Street Journal. Retrieved 3 July 2014

     

    reply to this | link to this | view in thread ]

  55.  
    identicon
    PRMan, Jul 3rd, 2014 @ 10:19am

    Re:

    I went there once to see what it was. Guess I am extreme.

     

    reply to this | link to this | view in thread ]

  56.  
    identicon
    DogBreath, Jul 3rd, 2014 @ 10:27am

    Re: Re: if BRL-CAD is free because it is a public work

    I thought it was : "because TorRORISTS!!!!!"

     

    reply to this | link to this | view in thread ]

  57.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 10:28am

    Re: GitHub, anyone?

    Here is the core routine:

    bool isExtermest(std::string name) {
    if (name != "John Smith") {
    return true; // Not an american.
    }

    if (name == "John Smith") {
    return true; // Obviously hiding something.
    }

    // Lots of irrelevant code.

    return false;
    }

     

    reply to this | link to this | view in thread ]

  58.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 10:32am

    Re: Re: I'm the oldest one!

    Cemetery Wind has a nice right to it!

     

    reply to this | link to this | view in thread ]

  59.  
    icon
    Lars (profile), Jul 3rd, 2014 @ 10:36am

    Re: mmm

    Literally everything.

    Ever seen the contents of a full background check? Now add in everything you've ever posted online, posted near you online, or referred to anything you've ever even viewed online.

     

    reply to this | link to this | view in thread ]

  60.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 10:38am

    Re: Re: GitHub, anyone?

    I fixed that inefficient code for you, this will do what you want.. (*)

    bool isExtremist(std::string name) {

    return true;
    }

    (* efficiency is important here after all, we can't waste processor cycles when we're processing everyone on the darned planet and in orbit around it, and we have built in capability for processing non-earth aliens by not using human characteristics as determinants)

     

    reply to this | link to this | view in thread ]

  61.  
    identicon
    Ruben, Jul 3rd, 2014 @ 10:43am

    Re: Re: Re: Re: Re: Re: Re: Re:

    Contorted, I see.

     

    reply to this | link to this | view in thread ]

  62.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 10:48am

    Re: Re: Re:

    1. I don't think it's much of a stretch to that someone else might leak information right now considering... 1. Anyone choosing to leak now knows that there are plenty of people out there that will support and try to protect them and 2. the public is paying attention these sorts of things and 3. they have practically been given a road map with step by step instructions for doing it successfully.

    2. I didn't really mean to divert your pun torrent either.

     

    reply to this | link to this | view in thread ]

  63.  
    identicon
    Gaming_Geek, Jul 3rd, 2014 @ 10:49am

    We're all extremists! The more the merrier I guess!

     

    reply to this | link to this | view in thread ]

  64.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 11:03am

    Re: Re: Re: Re: Re: Re: Re: Re:

    Or you could just BitTorrent a torrid little film to watch.

     

    reply to this | link to this | view in thread ]

  65.  
    icon
    Gaming_Geek (profile), Jul 3rd, 2014 @ 11:23am

    Re:

    So the extremists are the Assassins from Assassin's Creed? Everything is permitted?

    Does that make the NSA the Templars?

     

    reply to this | link to this | view in thread ]

  66.  
    identicon
    Ruben, Jul 3rd, 2014 @ 11:38am

    Re: Re: Re:

    This doesn't fit with previous content leaked from the Snowden cache. I believe there's a second leaker involved in this. Every article I've seen which cited a Snowden leak was conspicuously labeled as such. Why wouldn't that be the case here?

     

    reply to this | link to this | view in thread ]

  67.  
    icon
    Ninja (profile), Jul 3rd, 2014 @ 11:54am

    Re: Re:

    Aha, true enough!

     

    reply to this | link to this | view in thread ]

  68.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 12:20pm

    Re: Re:

    I went there once to see what it was. Guess I am extreme.

    Ditto that. And I used my work computer, too.

     

    reply to this | link to this | view in thread ]

  69.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 12:31pm

    Re: Re:

    Whoever it is - this could be the start of something huge. I wonder what other pieces of source code they may have absconded. Encryption/decryption routines? Exploits created in-house?

     

    reply to this | link to this | view in thread ]

  70.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 12:39pm

    Re: Re:

     

    reply to this | link to this | view in thread ]

  71.  
    icon
    Josh in CharlotteNC (profile), Jul 3rd, 2014 @ 12:56pm

    Re:

    The idea of a second leaker is getting some traction. Bruce Schneier and Cory Doctorow both think this did not come from the Snowden docs.

     

    reply to this | link to this | view in thread ]

  72.  
    icon
    That One Guy (profile), Jul 3rd, 2014 @ 1:04pm

    Re: Re: given their behavior

    Oh nothing so large-scale I'm sure, as soon as they started to look like they were trouble-makers, they'd have been scooped up, black bagged, and disappeared in a cell somewhere.

     

    reply to this | link to this | view in thread ]

  73.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 1:08pm

    Re: Suggestion for a secure PC & Internet in times of surveillance scandal

    Heads up. There hasn't been a version of Tails yet that doesn't phone home in some manner. In the beginning, their justification for the behavior was to "count" Tails users. Now, many versions down the line, it's automatically "checking for updates". You cannot defeat this with any setting, although you could certainly hex-edit the executable, and burn a new iso (recommended).

    This inexorable connection to boum.org, *in and of itself*, is a red-flag pointing to Tails usage.

     

    reply to this | link to this | view in thread ]

  74.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 1:14pm

    Re: Kafka called...

    No. In their view, they're providing you rope in the hopes you will hang yourself (so to speak).

     

    reply to this | link to this | view in thread ]

  75.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 1:24pm

    I didn't realize I was an extremist. I guess now I have to breed terriers and start listening to Abba.

     

    reply to this | link to this | view in thread ]

  76.  
    identicon
    Ruben, Jul 3rd, 2014 @ 1:39pm

    Re: Re: Re:

    What's your point there? All I see are unsubstantiated claims.

     

    reply to this | link to this | view in thread ]

  77.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 2:23pm

    even visitors to Tor sites -- whether or not they use the program -- have their details recorded


    So curiosity suicide-bombed the cat then?

     

    reply to this | link to this | view in thread ]

  78.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 2:41pm

    Re: Re: Re: Re:

    In that case, I would suggest you look further than you previously have. I will not look for you.

     

    reply to this | link to this | view in thread ]

  79.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 3:07pm

    The source code comments left by these NSA spying extremists, provides us with a clear picture into the culture and mindset of radical NSA spying fanatics.

     

    reply to this | link to this | view in thread ]

  80.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 3:38pm

    Re: Re: Re:

    To be fair since you're responding to an extremist they will classify you as one too.

     

    reply to this | link to this | view in thread ]

  81.  
    icon
    Padpaw (profile), Jul 3rd, 2014 @ 3:53pm

    Under the enemy expatriation act ( H.R. 3166 and S. 1698)the US government can strip a US citizen of their citizenship and their rights if they are classified as a terrorist.

    So what makes a citizen a terrorist, anything and everything these days.

    If you visit sites that preach dissent against any form of government misconduct congrats your a terrorist. If you protest anything peaceful or violent, your a terrorist. If you question your government over anything again your labelled a terrorist.

    Just look at the NDA to see extreme examples of how "national security" trumps the constitution.

     

    reply to this | link to this | view in thread ]

  82.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 5:36pm

    Re: Whatever is an extremist

    Was going to post this, but someone beat me to the punch.

    Obviously Whatever is fine with it, because all copyright/NSA fanboys are masochists by nature. How else could they loudly and proudly claim more copyright extensions and surveillance betters culture and society, while still keeping a poker face?

     

    reply to this | link to this | view in thread ]

  83.  
    icon
    Eldakka (profile), Jul 3rd, 2014 @ 6:36pm

    Re: Re: Re:

    Actually I think it's easier to leak stuff right now, as Snowden will get the blame no-matter who the leaker is.

     

    reply to this | link to this | view in thread ]

  84.  
    identicon
    Anonymous Coward, Jul 3rd, 2014 @ 10:08pm

    Re:

    Who else here is an extremist?

    At least TD readers are aware of the issues. But I do feel bad for people like Ty Pennington, snowboarders, anyone who eats Doritos...

     

    reply to this | link to this | view in thread ]

  85.  
    icon
    Coyne Tibbets (profile), Jul 3rd, 2014 @ 10:13pm

    Extremely extremist sensitive

    I would be interested to know if there is even one single person in the whole wide world, that NSA would not list as an extremist. (Assuming there are any it hasn't already listed.)

     

    reply to this | link to this | view in thread ]

  86.  
    icon
    T (profile), Jul 3rd, 2014 @ 11:49pm

    Re: Kafka called...

    I'd say it makes them a state sponsor of Torrorism.

    Next they'll be arguing in court that because it's so government-funded, users have no expectation of privacy!

     

    reply to this | link to this | view in thread ]

  87.  
    icon
    T (profile), Jul 3rd, 2014 @ 11:57pm

    Re: Extremely extremist sensitive

    The President at the time. Him/her ever be an extremist or violate the law? Un-possible!

     

    reply to this | link to this | view in thread ]

  88.  
    identicon
    Anonymous Coward, Jul 4th, 2014 @ 5:05am

    Re: Re: Re: Re:

    And by extension so are you!

     

    reply to this | link to this | view in thread ]

  89.  
    identicon
    Benny Adama, Jul 4th, 2014 @ 5:25am

    From now on I will make TOR my landing site, and TAILS my Main O/S

    In defiance, I am not using anonymous name:
    From now on I will make TOR my landing site, and TAILS my Main Linux O/S.
    Now Good luck NSA be my daily guest!

     

    reply to this | link to this | view in thread ]

  90.  
    identicon
    Peter, Jul 4th, 2014 @ 5:37am

    jokers.....

    common,

    this is not the xkeyscore code. everyone who works with this kind of data knows, this is only a selector for something but nothing more.

    do you realy believe the sourcecode for xkeyscore is somewhere on the table ? even, this short piece of code is never ever "The xkeyscore sourcecode".

    .....
    over and out

     

    reply to this | link to this | view in thread ]

  91.  
    identicon
    Anonymous Coward, Jul 4th, 2014 @ 1:00pm

    I am an extreme terrorist!

     

    reply to this | link to this | view in thread ]

  92.  
    identicon
    Anonymous Coward, Jul 4th, 2014 @ 7:29pm

    Re: Whatever is an extremist

    Agreed. Couldn't have happened to a nicer asshole.

     

    reply to this | link to this | view in thread ]

  93.  
    icon
    Coyne Tibbets (profile), Jul 5th, 2014 @ 3:18am

    Not just interested in encryption...

    So let's see...the news articles claim the NSA is interested in people who are interested in encryption or Tor.

    Well, according to the code snippet at NSA Targets the Privacy-Conscious for Surveillance, it goes just a bit beyond that...

    In fact, NSA captures every web search containing one of these words: "linux", "USB", "CD", "IRC" (Internet Relay Chat). They also capture anyone who goes to any article whatsoever that begins with "http://linuxjournal.com/content/linux". Does that sound like "interested in encryption" to you?

    This fits right in with my ideas of the NSA: When they claim they want x, they just capture everything and keep it all. If challenged, they say something like, "No, really, we were only interested in 'x'."

    Should we believe that? When, in this case, they capture every web search that contains the words above, whether it involves encryption or not?

     

    reply to this | link to this | view in thread ]

  94.  
    icon
    Coyne Tibbets (profile), Jul 5th, 2014 @ 3:35am

    Re: Not just interested in encryption...

    Sigh. I read the code wrong, with respect to the words list. The words must appear in combination with either the word "tails" or term "Amnesiac Incognito Live System". So it's not quite as sensitive to the words as I believed.

    It is sensitive to all the linuxjournal.com articles matching the lead-in, though.

     

    reply to this | link to this | view in thread ]

  95.  
    identicon
    abbadabba, Jul 5th, 2014 @ 6:13am

    hay

    HAY! I never used this tor before. My bro says it's for downloading stuff without paying for it. So I bet the bums in corporatism are behind this. Imagine how many people they will send to jail for just being cheap bastards who can't wait for it to come out on Netflix.

    Isn't Germany where NewsCorp found someone to make code to help folks download card codes for their competitors' TV satellite services? So that's sort of like tor, passing around the pirated shite, but hoping it kills the competition at the same time.

    Did you catch that criminal activity, NSA? Have you redeployed it?

     

    reply to this | link to this | view in thread ]

  96.  
    identicon
    abbadabba, Jul 5th, 2014 @ 6:21am

    Germany is perfectly placed to pie face the Five Eyes.

    David Cameron's email in Rebekah Brooks' BlackBerry was reported to the Leveson court to have lost its content after spending three weeks in police custody. The other email had text, so my bet is that's David's Tempora file well passed it's sellbuy date, gone meta after 30 days. Who's the Rose Mary Woods this time? Home Secretary. GCHQ, you silly beans.

    Give Cameron what he deserves, a big BlackBerry Pie in the facebook, Germany! Your pastry is vastly superior to his.

     

    reply to this | link to this | view in thread ]

  97.  
    icon
    Beta (profile), Jul 5th, 2014 @ 8:12am

    Re: Re: Re: Re: Re:

    I, for one, always try to look further than I previously have. But I will not chase your ball into the weeds.

     

    reply to this | link to this | view in thread ]

  98.  
    identicon
    Anonymous Coward, Jul 5th, 2014 @ 8:32am

    Re: Re: Re: Re: Re: Re:

    Suit yourself. Just remember, there are things hiding in the weeds you should be aware of.

     

    reply to this | link to this | view in thread ]

  99.  
    icon
    TtfnJohn (profile), Jul 5th, 2014 @ 10:40am

    Re:

    I've been in rooms in church basements full, just packed, with extremists!! These are Alcoholics Anonymous where some newbies take the Anonymity clause to ridiculous extremes and so use Tor as their way of maintaining their anonymity while on line! Though they'll stay members pf Facebook! Which we all know is just packed with extremists!

     

    reply to this | link to this | view in thread ]

  100.  
    identicon
    Anonymous Coward, Jul 5th, 2014 @ 10:19pm

    All this nonsense about Torrorists, is a bunch of bullsqueeze. Can't we all just be extreme friends?

     

    reply to this | link to this | view in thread ]

  101.  
    identicon
    Ali, Jul 7th, 2014 @ 8:02am

    boss

    so lets see, I use tor alot, I use linux, I have tails on usb,
    I am a security enthusiastic and most importantly I AM A MUSLIM.

    move along kids Boss is here ;)

     

    reply to this | link to this | view in thread ]

  102.  
    identicon
    Anonymous Coward, Mar 19th, 2015 @ 5:18pm

    Hi,I am a extreemeist looking to Tor the Constitution to pieces and blow up the white house

     

    reply to this | link to this | view in thread ]

  103.  
    identicon
    Anonymous Coward, Mar 19th, 2015 @ 5:19pm

    Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house

     

    reply to this | link to this | view in thread ]

  104.  
    identicon
    Anonymous Coward, Mar 19th, 2015 @ 5:19pm

    Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house

     

    reply to this | link to this | view in thread ]

  105.  
    identicon
    Anonymous Coward, Mar 19th, 2015 @ 5:19pm

    Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house

     

    reply to this | link to this | view in thread ]

  106.  
    identicon
    Anonymous Coward, Mar 19th, 2015 @ 5:19pm

    Hi,I am a extremist looking to Tor the Constitution to pieces and blow up the white house

     

    reply to this | link to this | view in thread ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
Advertisement
Essential Reading
Techdirt Deals
Techdirt Insider Chat
Techdirt Reading List
Advertisement
Recent Stories
Advertisement
Support Techdirt - Get Great Stuff!

Close

Email This

This feature is only available to registered users. Register or sign in to use it.