Delivery-Date: Thu, 03 Jul 2014 21:42:16 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,FREEMAIL_FROM,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id D671E1E0BB6
	for <archiver@seul.org>; Thu,  3 Jul 2014 21:42:11 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 37CE92FC5A;
	Fri,  4 Jul 2014 01:42:07 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 9EB852FC1A
 for <tor-talk@lists.torproject.org>; Fri,  4 Jul 2014 01:35:52 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 4WwsuIARKgv2 for <tor-talk@lists.torproject.org>;
 Fri,  4 Jul 2014 01:35:52 +0000 (UTC)
Received: from BLU004-OMC3S5.hotmail.com (blu004-omc3s5.hotmail.com
 [65.55.116.80])
 (using TLSv1.2 with cipher AES128-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 6324C2F014
 for <tor-talk@lists.torproject.org>; Fri,  4 Jul 2014 01:35:52 +0000 (UTC)
Received: from BLU180-W5 ([65.55.116.74]) by BLU004-OMC3S5.hotmail.com with
 Microsoft SMTPSVC(7.5.7601.22712); Thu, 3 Jul 2014 18:35:50 -0700
X-TMN: [axhG6bqcFRj+OXsT5MuXpc2NXjjIcdaa]
X-Originating-Email: [raiogam@hotmail.com]
Message-ID: <BLU180-W5B11353420A1D5F16B70CB1000@phx.gbl>
From: raiogam mestri <raiogam@hotmail.com>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
Date: Fri, 4 Jul 2014 01:35:49 +0000
Importance: Normal
In-Reply-To: <BLU180-W6565E35E1F4DBA6895B84BB1000@phx.gbl>
References: <BLU180-W2336D0CA6E675BE0B009BBB1010@phx.gbl>,
 <BLU180-W6565E35E1F4DBA6895B84BB1000@phx.gbl>
MIME-Version: 1.0
X-OriginalArrivalTime: 04 Jul 2014 01:35:50.0041 (UTC)
 FILETIME=[493F6090:01CF9728]
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] use gpg or fork in tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

i'm a devif tor not use it is nsa can spy torif not 2 key 1 for encript and=
 1 for decript not workanyone and someone have encript key anyone and someo=
ne  encript and send to user via torthe user have decript keyand receive th=
e code encript via torand decrypt they

i  search "open source" and look this after is line is quote.NSA says it on=
ly gathers such data for "valid foreign intelligence purposes."by Cyrus Far=
ivar - July 3 2014, 3:40pm HBNATIONAL SECURITY35 Enlarge  / The structure o=
f a three-hop Tor circuit.NSA LEAKSNew Snowden docs: NSA spies on pretty mu=
ch everyone abroadPakistan, Iran, and=85 USA? New heatmap shows where NSA h=
acksWhat the NSA can (and can=92t) mine from intercepted photosSnowden comp=
lained about mass surveillance tactics to his NSA mastersNSA loves The Baha=
mas so much it records all its cellphone callsView all=85Two Germany-based =
Tor Directory Authority  servers, among others, have been specifically targ=
eted by the National Security Agency=92s XKeyscore program, according to a =
new report  from German public broadcaster ARD. Tor  is a well-known open s=
ource project designed to keep users anonymous and untraceable=97users' tra=
ffic is encrypted and bounced across various computers worldwide to keep it=
 hidden.This marks the first time that actual source code  from XKeyscore h=
as been published. ARD did not say how or where it obtained the code. Unlik=
e many other NSA-related stories, the broadcaster did not specifically ment=
ion the information being part of the trove leaked by whistleblower Edward =
Snowden.XKeyscore is one of the high-level NSA surveillance programs that h=
ave been revealed via Snowden over the last year. The interface allows NSA =
and allied intelligence agencies to search all kinds of short-term data cap=
tured directly off of various Internet Exchanges worldwide.This new code, w=
hich was published on Thursday, appears to flag people who are believed to =
live outside the United States and who request Tor bridge information via e=
-mail or who search for or download Tor or the security-minded TAILS operat=
ing system . Those users' IP addresses can then be tracked for further moni=
toring.The report=92s authors include Jacob Appelbaum, a well-known America=
n computer security researcher who has taken up residence in Berlin. Appelb=
aum is also a paid employee of the Tor Project. Two others listed as author=
s are either contractors or volunteers to Tor.=93Their research in this sto=
ry is wholly independent from the Tor Project and does not reflect the view=
s of the Tor Project in any way,=94 ARD stated in a disclosure. =93During t=
he course of the investigation, it was further discovered that an additiona=
l computer system run by Jacob Appelbaum for his volunteer work with helpin=
g to run part of the Tor network was targeted by the NSA. Moreover, all mem=
bers of this team are Tor users and appear to be have been targets of the m=
ass surveillance described in the investigation.=94FURTHER READINGBUILDING =
A PANOPTICON: THE EVOLUTION OF THE NSA=92S XKEYSCOREHow the NSA went from o=
ff-the-shelf to a homegrown "Google for packets."The code specifically cite=
s IP addresses of the Tor Directory Authority=97these servers act as the ni=
ne high-level control points that make up the backbone of the Tor Network. =
These authorities are what keep track of new Tor relays, and they are updat=
ed every hour.Tor was originally developed as part of the Onion Routing pro=
ject at the US Naval Research Laboratory . While today it exists as an inde=
pendent nonprofit organization headquartered in Massachusetts, it still rec=
eives 60 percent of its income  (PDF) from US government sources. Tor is us=
ed by journalists, law enforcement, military officers, and activists worldw=
ide.Another rule in the published code shows that the NSA is also targeting=
 users of an anonymous e-mail program called MixMinion , which is hosted on=
 a server at the Massachusetts Institute of Technology. Roger Dingledine, w=
ho is the head of the Tor Project, also runs this MixMinion server.Vanee Vi=
nes, the spokeswoman for the NSA, responded to Ars' request for comment wit=
h the same statement that she provided to ARD:In carrying out its mission, =
NSA collects only what it is authorized by law to collect for valid foreign=
 intelligence purposes=97regardless of the technical means used by foreign =
intelligence targets. The communications of people who are not foreign inte=
lligence targets are of no use to the agency.In January, President Obama is=
sued U.S. Presidential Policy Directive 28 , which affirms that all persons=
=97regardless of nationality=97have legitimate privacy interests in the han=
dling of their personal information, and that privacy and civil liberties s=
hall be integral considerations in the planning of U.S. signals intelligenc=
e activities.The president's directive also makes clear that the United Sta=
tes does not collect signals intelligence for the purpose of suppressing or=
 burdening criticism or dissent, or for disadvantaging persons based on the=
ir ethnicity, race, gender, sexual orientation, or religion.XKeyscore is an=
 analytic tool that is used as a part of NSA's lawful foreign signals intel=
ligence collection system. Such tools have stringent oversight and complian=
ce mechanisms built in at several levels. The use of XKeyscore allows the a=
gency to help defend the nation and protect U.S. and allied troops abroad.A=
ll of NSA's operations are conducted in strict accordance with the rule of =
law, including the President's new directive.
 		 	   		   		 	   		   		 	   		  =

-- =

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

