Dot Com
Nullius in verba
Like I always said- George Orwell was right.
Attacking Tor: how the NSA targets users' online anonymity | World news | theguardian.com
We'll see if the gov't reins itself in but I doubt it
Obama hints at changes in NSA collection of phone data - latimes.com
44 might be a sell-out like most all Repubs but we'll see
Discuss...
Attacking Tor: how the NSA targets users' online anonymity | World news | theguardian.com
Our Government Has Weaponized the Internet. Here's How They Did It | Wired Opinion | Wired.comAccording to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identified Tor users on the internet and then executes an attack against their Firefox web browser.
The NSA refers to these capabilities as CNE, or computer network exploitation.
According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”
We'll see if the gov't reins itself in but I doubt it
Obama hints at changes in NSA collection of phone data - latimes.com
44 might be a sell-out like most all Repubs but we'll see
Discuss...