Jump to content
Not connected, Your IP: 44.220.182.198

Search the Community

Showing results for tags 'snowden'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 3 results

  1. Yesterday The Intercept released a new tranche of NSA documents from the Snowden leaks; https://theintercept.com/snowden-sidtoday/ Among them was a Signals Intelligence Directorate newsletter from 2004 named; Targeting Terrorist Internet Traffic https://assets.documentcloud.org/documents/3233073/Targeting-Terrorist-Internet-Traffic.pdf It introduces Project DISTANTFISH which was established in 2004 (one can imagine how much it has developed over the past 12 years!) Here is an excerpt that is pertinent to AirVPN users, as AirVPN uses shared servers "for better protection"; TOTALLY FALSE - NOTE BY STAFF For more information; https://www.emptywheel.net/2016/12/07/distantfish-and-correlations/
  2. Hi, after the usual worrisome news, - http://thehackernews.com/2015/10/nsa-crack-encryption.html I have one question among others: They state 'Around 92% of the top 1 Million Alexa HTTPS domains make use of the same two primes for Diffie-Hellman, possibly enabling the agency to pre-compute a crack on those two prime numbers and read nearly all Internet traffic through those servers.' So how do the renaming 8% update them? Also hos vpn providers can protect to some extent against this ? cheers
  3. The following slides were published by The Intercept about exploiting VPN and VoIP protocols: https://www.documentcloud.org/documents/1076868-vpn-and-voip-exploitation-with-hammerchant-and.html#document/p1 I cannot understand them well. Can anyone here infer whether the OpenVPN protocol as implemented by Air (or in any form) may be vulnerable?
×
×
  • Create New...