NSA Targets Tor Network But Has No Luck Cracking It

rated by 0 users
This post has 2 Replies | 0 Followers

Top 10 Contributor
Posts 26,345
Points 1,191,215
Joined: Sep 2007
ForumsAdministrator
News Posted: Sun, Oct 6 2013 3:23 AM
The average Internet user probably has no idea what "Tor" is. If you're one of those users, you've probably had no good reason to even investigate what it is, what it does, or how it hides. But if you're the NSA, you're acutely aware of Tor, and a new report suggests that both the NSA and GCHQ have had their sights on Tor. In simple terms, Tor is a network that protects anonymity of those who use it. What's interesting about Tor is that the software behind it is mostly funded by the U.S. government; despite all that, the U.S. National Security Agency has had no success in "developing attacks against people using Tor."


This is all part of the Edward Snowden fallout, and the latest batch of intel shows that the NSA's only successful exploits on Tor rely on " identifying users and then attacking vulnerable software on their computers." Tor itself has proven a tough match to bring down, even by the NSA. According to internal documents, Tor is "the king of high-secure, low-latency internet anonymity." Tor basically bounces traffic around in an odd way so to conceal where the information is coming from and where it's truly headed.


The upside? At least Tor users have largely been able to maintain their cover. The downside? Agencies are working hard to try and change that, and it's likely only a matter of time before they win.
  • | Post Points: 35
Top 500 Contributor
Posts 98
Points 670
Joined: Aug 2012
ECouts replied on Sun, Oct 6 2013 9:56 AM

So basically, the government is just like any other; all they want is to control EVERYTHING and keep expanding until they do. Greedy derks!

  • | Post Points: 5
Not Ranked
Posts 12
Points 60
Joined: Oct 2013

No, it won't be a matter of time before they win. It will only be a matter of time before they lose.

Encryption will always be fundamentally faster than decryption. The gap just gets wider as computer performance increases.

If think about that for a minute (this is a hardware site, after all) you might realize why they are so concerned. Against a properly implemented open-source cryptosystem, without recourse to backdoors and skullduggery, they will inevitably lose.

"We will never be able to de-anonymize all Tor users" -the NSA

Now go download Tor. Run it off a fresh Linux install, preferably on a Live CD so the OS can't be modified. Don't forget to block all scripts with NoScript to protect against browser attacks.

  • | Post Points: 5
Page 1 of 1 (3 items) | RSS