How did NSA have access to the Tor network

In a recent Guardian article, Security Specialist Bruce Schneier reported that the US National Security Agency is attacking users of the anonymous network, Tor. The Schneier article, based on the documents leaked by Edward Snowden, came just days after Silk Road was closed, an underground website that only used the Tor network for its connections.

Thu

Below is one του τρόπου με τον οποίο η NSA είχε πρόσβαση στο ανώνυμο δίκτυο, όπως την παρουσίασε η DailyDot:

Scan the traffic on the Internet. The NSA programs such as Stormbrew, Fairview, Oakstar and Blarney. These programs are categorized by the documents leaked by Snowden as "upstream" data collection programs. Through them, the secret service drew information from the major telecommunications companies and their optical fibers that form the backbone of the Internet.
Record all Tor requests. Δεδομένου ότι η NSA παρακολουθεί την κίνηση του Διαδικτύου σε όλο τον κόσμο, ο  Schneier αναφέρει ότι συγκρατεί τα “δακτυλικά αποτυπώματα” των αιτήσεων των χρηστών του Tor με διάφορους διακομιστές . Αποθηκεύει τις αιτήσεις αναζήτησης σε βάσεις δεδομένων, όπως την XKeyscore, μέσω της οποίας η NSA παρακολουθεί email, περιηγήσεις στον ιστό, και συνομιλίες στο , in real time.
Sighting excessive motion. The NSA uses automated software to separate data from Tor users across all Internet traffic. As Schneier put it: "The same feature that makes Tor a powerful anonymity service, and the fact that all Tor users are alike on the Internet, makes it very easy to differentiate Tor users from other Internet users. ”
Redirecting users to NSA servers. The NSA via the major telecom companies redirects Tor users to a secret server system called FoxAcid. So the secret service has the ability to place those who call Quantum servers at key points along the optical fiber. These servers pretend to be the legitimate Tor servers a user is looking for to connect to the network.
Attack on users' computers. Through NSA's controlled FoxAcid system, the service attacks Tor users. These attacks, according to Schneier, exploit the weaknesses of Firefox and thus acquire on the computer of the unsuspecting user.
Identify Tor users. After infiltrating a Tor user's computer, the NSA begins spying on its various activities and is likely to collect both metadata and content from Internet use. From this information, it tries to locate other users.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).