GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
All the NSA need to do to snoop on Tor is generate or obtain a fake SSL certificate. Something not too difficult nowadays, just search a search engine, and you'll find plenty of news on the subject: https://duckduckgo.com/?q=fake+ssl&kp=-1
This would obviously be a trivial task for the NSA.
Now, being paranoid, I think Tor itself, and the way it is pushed and promoted suggests that something is behind them too. I wonder how much the NSA had to do with the design of Tor. Obviously end-to-end encryption is better. I know freenet uses this, but also runs on Java ... and I'm sure you've read plenty about Java and security recently.
They're not monitoring every person as everyone might think. That would cost money and time for useless data gathering. What they're looking for are certain keywords in communication. They use super computers to filter keywords related to terrorism, weapons of terrorism and/or hate terms against the USA which triggers a red flag on your communication. That's what I heard on a talk show on my radio. But is it the truth???
Very little is known about the NSA. Other agencies might do what you say, but you never know with the NSA. From the data centers they have built and are building they are hoarding massive amounts of data (not unlike another secret service from the past). This time, however, they have the advent of advanced search engines, such as their good friend Google, whom they surely helped to come into being. I think they'd rather store the data and search it later when they might need to.
Distribution: Debian Wheezy/Jessie/Sid, Linux Mint DE
Although I am strongly against any terrorism acts, I am also against unlimited data mining, warrantless searches and TSA airport terrorism.
The search for terrorism acts has been highly unsuccessful, and again and again it appears agencies have lacked co-operation or have simple been ignoring red flags and clear signals. That should be solved by making the agencies more efficient and doing their work right, not by granting them more rights for invasion of privacy.