Search the Community
Showing results for tags 'Snowden'.
Found 3 results
-
Yesterday The Intercept released a new tranche of NSA documents from the Snowden leaks; https://theintercept.com/snowden-sidtoday/ Among them was a Signals Intelligence Directorate newsletter from 2004 named; Targeting Terrorist Internet Traffic https://assets.documentcloud.org/documents/3233073/Targeting-Terrorist-Internet-Traffic.pdf It introduces Project DISTANTFISH which was established in 2004 (one can imagine how much it has developed over the past 12 years!) Here is an excerpt that is pertinent to AirVPN users, as AirVPN uses shared servers "for better protection"; TOTALLY FALSE - NOTE BY STAFF For more information; https://www.emptywheel.net/2016/12/07/distantfish-and-correlations/
-
Hi, after the usual worrisome news, - http://thehackernews.com/2015/10/nsa-crack-encryption.html I have one question among others: They state 'Around 92% of the top 1 Million Alexa HTTPS domains make use of the same two primes for Diffie-Hellman, possibly enabling the agency to pre-compute a crack on those two prime numbers and read nearly all Internet traffic through those servers.' So how do the renaming 8% update them? Also hos vpn providers can protect to some extent against this ? cheers
-
The following slides were published by The Intercept about exploiting VPN and VoIP protocols: https://www.documentcloud.org/documents/1076868-vpn-and-voip-exploitation-with-hammerchant-and.html#document/p1 I cannot understand them well. Can anyone here infer whether the OpenVPN protocol as implemented by Air (or in any form) may be vulnerable?