OpenSourcerer 1435 Posted ... The owner of one of the TOR directory servers himself confirmed he had seen the source code of XKeyscore and saw his server's IP hardcoded in there. The server is located in Nürnberg, Germany, and is called Gabelmoo. Id est: XKeyscore logged every attempt to access his server. Additionally, comments made in the source code show that everyone who is accessing the directory server is made an "extremist" - at least in the terminology of the NSA. In the source code the student hasn't seen any proof that TOR relay servers are exposed to the same risk. This task might be allotted to another application... Source#1 Source#2 excellent addition by sheivoko - the XKeyscore rules! 1 InactiveUser reacted to this Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
InactiveUser 188 Posted ... Leaked XKeyscore selectors:http://daserste.ndr.de/panorama/xkeyscorerules100.txtIf this document is authentic, any interest in Tor will mark you as an extremist: - Asking bridges@torproject.org for a bridge IP: "Database Tor bridge information extracted from confirmation emails"Which means that the NSA gains knowledge about the non-public entry nodes and those who use them.Isn't it unbelievable that dissidents using Tor in China, Iran, repressive countries all over the world become NSA targets? Marked as extremists by the land of the free? - Googling for.. "('tails' or 'Amnesiac Incognito Live System') and word('linux'or ' USB ' or ' CD ' or 'secure desktop' or ' IRC ' or 'truecrypt' or ' tor ');$TAILS_websites=('tails.boum.org/') or ('linuxjournal.com/content/linux*');"Welcome to the NSA database, extremist! - Using Tor hidden services: * Aggregate Tor hidden service addresses seen in raw traffic.If you run hidden services, don't consider them "hidden". Expect exploitation attempts. Do not let them scare you off Tor. Yes, it's scary, but if you think about the rotten goals of NSA/GCHQ/BND, it's not a shocking revelation - it had to be expected. So, the only conclusion should be: Use the heck out of Tor, now more than ever! You can't escape ubiquitous surveillance, but you can make it harder! Run nodes! Fund nodes! Stop voting for parties that don't act against the surveillance state! Make yourself heard! 2 OpenSourcerer and CultureVulture reacted to this Quote Hide InactiveUser's signature Hide all signatures all of my content is released under CC-BY-SA 2.0 Share this post Link to post
OpenSourcerer 1435 Posted ... Leaked XKeyscore selectors:http://daserste.ndr.de/panorama/xkeyscorerules100.txtIf this document is authentic, any interest in Tor will mark you as an extremist: - Asking bridges@torproject.org for a bridge IP:"Database Tor bridge information extracted from confirmation emails"Which means that the NSA gains knowledge about the non-public entry nodes and those who use them.Isn't it unbelievable that dissidents using Tor in China, Iran, repressive countries all over the world become NSA targets? Marked as extremists by the land of the free? - Googling for..>"('tails' or 'Amnesiac Incognito Live System') and word('linux'or ' USB ' or ' CD ' or 'secure desktop' or ' IRC ' or 'truecrypt' or ' tor ');$TAILS_websites=('tails.boum.org/') or ('linuxjournal.com/content/linux*');"Welcome to the NSA database, extremist! - Using Tor hidden services:* Aggregate Tor hidden service addresses seen in raw traffic.If you run hidden services, don't consider them "hidden". Expect exploitation attempts. Do not let them scare you off Tor. Yes, it's scary, but if you think about the rotten goals of NSA/GCHQ/BND, it's not a shocking revelation - it had to be expected. So, the only conclusion should be: Use the heck out of Tor, now more than ever! You can't escape ubiquitous surveillance, but you can make it harder! Run nodes! Fund nodes! Stop voting for parties that don't act against the surveillance state! Make yourself heard! EXCELLENT ADDITION! Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post