GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Nothing surprises me anymore. Our privacy has been tossed out the windows eons ago. I even doubt if privacy mode in our browsers have any affect. Who knows what's their real intentions with our data.
All the NSA need to do to snoop on Tor is generate or obtain a fake SSL certificate. Something not too difficult nowadays, just search a search engine, and you'll find plenty of news on the subject: https://duckduckgo.com/?q=fake+ssl&kp=-1
This would obviously be a trivial task for the NSA.
Now, being paranoid, I think Tor itself, and the way it is pushed and promoted suggests that something is behind them too. I wonder how much the NSA had to do with the design of Tor. Obviously end-to-end encryption is better. I know freenet uses this, but also runs on Java ... and I'm sure you've read plenty about Java and security recently.
Conclusion: You are not and cannot be anonymous to the NSA. They see all.
Now, here's another question: "Knowing" that Tor makes you "anonymous", how much more likely are you to do things you aren't supposed to ? I gotta hand it to them, they have done well.
Last edited by H_TeXMeX_H; 06-12-2013 at 09:56 AM.
They're not monitoring every person as everyone might think. That would cost money and time for useless data gathering. What they're looking for are certain keywords in communication. They use super computers to filter keywords related to terrorism, weapons of terrorism and/or hate terms against the USA which triggers a red flag on your communication. That's what I heard on a talk show on my radio. But is it the truth???
Very little is known about the NSA. Other agencies might do what you say, but you never know with the NSA. From the data centers they have built and are building they are hoarding massive amounts of data (not unlike another secret service from the past). This time, however, they have the advent of advanced search engines, such as their good friend Google, whom they surely helped to come into being. I think they'd rather store the data and search it later when they might need to.
Distribution: Debian /Jessie/Stretch/Sid, Linux Mint DE
Posts: 5,195
Rep:
Although I am strongly against any terrorism acts, I am also against unlimited data mining, warrantless searches and TSA airport terrorism.
The search for terrorism acts has been highly unsuccessful, and again and again it appears agencies have lacked co-operation or have simple been ignoring red flags and clear signals. That should be solved by making the agencies more efficient and doing their work right, not by granting them more rights for invasion of privacy.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.