GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
PLEASE NOTE: All LQ Rules apply to the General forum. Flame wars, personal attacks, hostility, insults and behavior of that nature will not be tolerated. Differing opinions are one of the things that make this site great, but to benefit from differing opinions the discourse must happen respectfully and thoughtfully... without insult and personal attack. Members who are unable or unwilling to participate in General under those parameters will not be permitted to do so. If you see behavior of this nature please report it.
All the NSA need to do to snoop on Tor is generate or obtain a fake SSL certificate. Something not too difficult nowadays, just search a search engine, and you'll find plenty of news on the subject: https://duckduckgo.com/?q=fake+ssl&kp=-1
This would obviously be a trivial task for the NSA.
Now, being paranoid, I think Tor itself, and the way it is pushed and promoted suggests that something is behind them too. I wonder how much the NSA had to do with the design of Tor. Obviously end-to-end encryption is better. I know freenet uses this, but also runs on Java ... and I'm sure you've read plenty about Java and security recently.
They're not monitoring every person as everyone might think. That would cost money and time for useless data gathering. What they're looking for are certain keywords in communication. They use super computers to filter keywords related to terrorism, weapons of terrorism and/or hate terms against the USA which triggers a red flag on your communication. That's what I heard on a talk show on my radio. But is it the truth???
Very little is known about the NSA. Other agencies might do what you say, but you never know with the NSA. From the data centers they have built and are building they are hoarding massive amounts of data (not unlike another secret service from the past). This time, however, they have the advent of advanced search engines, such as their good friend Google, whom they surely helped to come into being. I think they'd rather store the data and search it later when they might need to.
Distribution: Debian Wheezy/Jessie/Sid, Linux Mint DE
Although I am strongly against any terrorism acts, I am also against unlimited data mining, warrantless searches and TSA airport terrorism.
The search for terrorism acts has been highly unsuccessful, and again and again it appears agencies have lacked co-operation or have simple been ignoring red flags and clear signals. That should be solved by making the agencies more efficient and doing their work right, not by granting them more rights for invasion of privacy.