Delivery-Date: Wed, 25 Nov 2015 21:47:18 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id C6D7A1E0384;
	Wed, 25 Nov 2015 21:47:16 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 80CFF375A0;
	Thu, 26 Nov 2015 02:47:11 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 0D40836413
 for <tor-talk@lists.torproject.org>; Thu, 26 Nov 2015 02:47:08 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Mm90ODntUen6 for <tor-talk@lists.torproject.org>;
 Thu, 26 Nov 2015 02:47:07 +0000 (UTC)
Received: from smtp23.openmailbox.org (smtp23.openmailbox.org [62.4.1.57])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id D460C351E1
 for <tor-talk@lists.torproject.org>; Thu, 26 Nov 2015 02:47:07 +0000 (UTC)
Received: by mail2.openmailbox.org (Postfix, from userid 1002)
 id E37857C19B3; Thu, 26 Nov 2015 03:47:02 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1448506022;
 bh=sWOAYIW4NvxtiIKL840XHlqmhQtNU+7HBSwIl63UFCs=;
 h=Date:From:To:Subject:References:In-Reply-To:From;
 b=TgxejmnxaIJrMsBEIid5mLQxT3Lw4Qp3OVlZmSuWMhv0yQmeq9nMVrPhsIuSxh/lp
 O1UZLvOLBou2ixXjr6F/J7HZLw1CIh326SlhG51c8e7P/iNdgnn10VPU67Kr6Q6xnn
 eeCFSdyzVkQzw4TSkGb+EsmJcUIIdFV6G1rfRDV0=
Message-ID: <5656729A.1080005@openmailbox.org>
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1448506012;
 bh=sWOAYIW4NvxtiIKL840XHlqmhQtNU+7HBSwIl63UFCs=;
 h=Date:From:To:Subject:References:In-Reply-To:From;
 b=YbKr4qggdNMGja2I7sCqOs/xoDeMSQtxzJo5LMW4IGFiRJAbRAF8Rvx79Qp5sw8wx
 SX9sBkiWM7Ee4hNL1NK1RPHyaqzzNpBT3WBrr3POx3U/qIUqqKguWyPbx+wnqTawo1
 sE1jGB5Q5hiKbmnL2QHed1WGZdJG8jbYhwtKoZ7M=
Date: Thu, 26 Nov 2015 02:46:50 +0000
From: Anton Nesterov <komachi@openmailbox.org>
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <56544409.80609@openmailbox.org>
 <4D4E72A9A78.0000053Bbeatthebastards@inbox.com>
 <5654DD4D.901@openmailbox.org> <5655CA5C.1000907@gmail.com>
In-Reply-To: <5655CA5C.1000907@gmail.com>
Subject: Re: [tor-talk] Russia actually kind of cracked (?) Tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

It's not like western LI. LI means there is order which ISP execute. In
SORM there is no such thing, just some black box with full traffic
mirrored on it installed at every ISPs with direct link to FSB (other
agencies get access mostly via FSB, but some install their own SORM). I
said, it's very similar to country-wide NarusInsight, or to much broader
Tempora. BTW that boxes not only intercept traffic, but also store and
analyze it.

I recommend you read The Red Web by Andrei Soldatov and Irina Borogan,
it describe Russian surveillance in details.

aka:
> Looks to me like average lawful interception seen in the west, except
> crypto is excluded. In no way this can count as mass surveliance.
> 
> Anton Nesterov wrote:
>> System of technical facilities aimed to providing functions of Operative
>> Investigative Operations, it's a Russian mass surveliance system
>> simuliar to NarusInsight, but with all-country coverage.
>>
>> https://en.wikipedia.org/wiki/SORM
>>
>>
>> I:
>>> What does SORM stand for?
>>>
>>> Robert
>>>
>>>
>>
>>


-- 
https://nesterov.pw
GPG key: 0CE8 65F1 9043 2B11 25A5 74A7 1187 6869 67AA 56E4
https://keybase.io/komachi/key.asc
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

