Jump to content
Not connected, Your IP:

Search the Community

Showing results for tags 'snowden'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



Website URL







XMPP / Jabber




Found 3 results

  1. Yesterday The Intercept released a new tranche of NSA documents from the Snowden leaks; https://theintercept.com/snowden-sidtoday/ Among them was a Signals Intelligence Directorate newsletter from 2004 named; Targeting Terrorist Internet Traffic https://assets.documentcloud.org/documents/3233073/Targeting-Terrorist-Internet-Traffic.pdf It introduces Project DISTANTFISH which was established in 2004 (one can imagine how much it has developed over the past 12 years!) Here is an excerpt that is pertinent to AirVPN users, as AirVPN uses shared servers "for better protection"; TOTALLY FALSE - NOTE BY STAFF For more information; https://www.emptywheel.net/2016/12/07/distantfish-and-correlations/
  2. Hi, after the usual worrisome news, - http://thehackernews.com/2015/10/nsa-crack-encryption.html I have one question among others: They state 'Around 92% of the top 1 Million Alexa HTTPS domains make use of the same two primes for Diffie-Hellman, possibly enabling the agency to pre-compute a crack on those two prime numbers and read nearly all Internet traffic through those servers.' So how do the renaming 8% update them? Also hos vpn providers can protect to some extent against this ? cheers
  3. The following slides were published by The Intercept about exploiting VPN and VoIP protocols: https://www.documentcloud.org/documents/1076868-vpn-and-voip-exploitation-with-hammerchant-and.html#document/p1 I cannot understand them well. Can anyone here infer whether the OpenVPN protocol as implemented by Air (or in any form) may be vulnerable?
  • Create New...