The NSA is Watching and Ready to Attack. Tor Bundle Exploits Compromise You.

39 Responses

  1. Haze7

    Its not why they collect information we should be concerned about its what they do with that info. Like they should not share intel with other agencies or even the government itself about a single murder a robbery or a plot to steal. They should only share about a upcoming mass murder plot or a scheme to bring about major economic collapse(you know all that Die Hard stuff)..The NSA actually helped us a lot of times…ANd they’ve been secretive about it 4 a long time.

    • Cheesethief

      You are naive enough to eat up all of the BS they spout about them actually stopping anything? What they are doing has probably helped no one and is a danger to everyone, not only the citizens of the U.S., but the world as well.

      They are scum and need to be closed down for good.

    • timemachine

      they searching for perfect time machine theory..
      so they can build one, and dominate the world.

  2. hgoel0974

    The prominent thing for me is that it’s okay for a government agency to hack into peoples’ computers and steal information but some individual who even claims to ‘hack things togethor’ is a serious threat and loses his constitutional rights? Isn’t the government also supposed to be under the law?
    Like come on! Just read this case:
    http://www.theregister.co.uk/2013/10/23/hacker_seizure_rights_case/

  3. James Way

    How convenient…”We’ve stopped plenty a terrorist plot, but because WE stopped it you never heard about it. Had we not, you’d be dead. Oh we also can’t divulge what we gather that led to us stopping said attack.” Like I said…How convenient. I got into an argument a week back with my girl. She had called. I was pooping and playing Candy Crush so I didn’t answer. I called her later and she was livid. “You never answer your phone when I call.” Me :”It was just this one time, you never answer either too.” her: “Yeah name one time.” Someone similar…is it like a red herring?

  4. anoanon

    Uhh from what I remember, they only have the power to unhide a very small number of people at one given time, and for the most part, cannot even choose who to unmask. So it’s not technically unsafe, the documents stated that they will never be able to unmask all tor users at once, that tor was too secure and they could only focus on exploiting firefox or using phishing techniques and such to plant something on a users computer and unmask them that way.

    • Jd8531

      All of that is mentioned in my article.

      • anonanon

        Sorry, didn’t read the whole article, It’s just that the title “The NSA is Watching and Ready to Attack. Tor Bundle Exploits Compromise You.”

        and the opening paragraph

        “Recent discoveries show that the Tor bundle isn’t keeping you safe, and the NSA is actually able to watch you by a complex system of attacks.”

        Makes it sound like the security that tor offers has been completely broken when that’s hardly the case.

        • Jd8531

          Wasn’t trying to sound like it. That was an opening summary more so. But an exploit is an exploit, using the bundle has the chance of not being safe.

  5. jonny2jo

    Ahahahahaha u just made my day!! 😀

  6. xyphon

    To my opinion, either they should or shouldn’t do, I think time will give us answer…

  7. Hmmm

    What a bunch of morons, it doesn’t matter unless you have something to hide. I don’t so I don’t care.

    • Epicsnail

      Or do you….

    • DS_Marine

      humm some people already do that on facebook or twitter…

    • mlc

      You’re a fool. What may be considered inappropriate or suspicious can change with the current powers or political winds, so you may believe you have nothing to hide while the system sees you as suspicious. Presumably you’re not somewhere where you’re likely to be extrajudicially assassinated for looking or seeming suspicious, but that doesn’t mean this couldn’t harm you.

      For example, your connection to someone else who is more suspicious could make you a target for punishment, or your political beliefs or private statements could be used against you economically by ruining your career.

  8. mlc

    I know you linked to the sources at the bottom, but it might have been nice to mention Edward Snowden or the names of any of the journalists involved, like Glenn Greenwald for example. All the moreso since Edward Snowden is now in hiding from his own country to avoid the illegal treatment and harsh judicial punishment that Bradley Manning received.

    Also the primary vulnerability with Tor isn’t Tor itself, but everything else. As the documents recognize, it is possible to de-anonymize some Tor users, but it isn’t particularly easy to pick a specific user to do this to. The vulnerability with the browser bundle was a Firefox vulnerability, and otherwise they have to rely on compromised nodes or infecting the targets computer.

    • mlc

      But on a more positive note, I’m happy to see this article here. It’s important for people to be informed about things like this, so that they can process the information and get over “well I’ve got nothing to hide” or “but since I’m not a terrorist or criminal, I’ll be fine” syndrome.

      Also, for the people who say this is acceptable: Only targeted, legally approved surveillance or surveillance against literal enemies should be acceptable. Secret, non-adversarial courts approving blanket surveillance of all people don’t count, and are hardly deserving of the label “court.” These actions violate the Fourth Amendment (when used domestically by the USA) and the European Convention on Human Rights when used internationally, so it doesn’t matter if “you have nothing to hide.” The simple fact that you’re okay with giving up your rights doesn’t mean that you can give up mine as well.

      Also there is evidence that these powers have been used for economic espionage, as well as to spy on lovers and ex-lovers of analysts, which kind of undermines the “nothing to hide” argument as the powers aren’t being directed solely at dangerous people. (and it wouldn’t matter if they were, since surveillance of everyone to find some criminals isn’t rational or legal)

    • mlc

      EDIT: Excuse me, I should have said Chelsea Manning. I’ve written Bradley Manning so many times in the past that I’m not used to writing her name.

    • Jd8531

      I mentioned Snowden in the article. When it comes to leaked NSA material its almost synonymous with him. Glenn has been a big part and I acknowledge him but this time it was more Snowden and the general two.

      I did mention that in the article. While it isnt easy, it is still possible. And while it was a firefox/tor bundle exploit, their method of obtaining info and attacking can be done via any browser (or proxy) vulnerability.

      Glad you like the article, the whole point was to inform about whats going on. Im going to start covering this topic more. Some of the hacking techniques, programs and super computers are interesting to look at.

    • narnia

      Great article Jd8531, great responses mic. I have just one thing to add.

      The recent vulnerability in the Tor browser bundle was in Firefox 17 JavaScript. It targeted Windows, so once again Linux users are safe. Victims of the exploit must also have had JavaScript enabled. It is common sense that you should not use JavaScript on Tor if you want security. By default the Tor browser bundle comes packaged with NoScript extension (I think). Tor browser wasn’t built for YouTube.

      The FBI caught Dread Pirate Roberts from Silk Road not through vulnerabilities in Tor or Bitcoin, but (probably) through vulnerabilities in the website’s code that eventually revealed admin powers.

  9. Pali

    *** you NSA 🙂

  10. SSJ-Vita

    Yeah *** the nsa

  11. titegtnodI

    “Just when you thought there was no bounds to what the NSA could do, think again.”

    …So…there are bounds?

  12. nevercall

    SO, can NSA can find the right codes and blueprints for cracking PS Vita? 😀

    • Jd8531

      haha maybe they can spy on Sony for us and get the Vita’s keys.

      • narnia

        If Sony had any sense these keys are treated with the same security protocols as HTTPS certificate vendors. Private keys of such value should remain on an isolated machine that cannot connect to the internet. Files would be taken to and from the secure machine via USB to perform final production compilation.

        But given Sony’s track record, they probably send them over insecure internet protocols, encrypted only using the password “4”, and the department responsible for sending the keys will be separate from the team responsible for securing the keys.

  13. gunblade

    but i would think that with the new windows 8 and the email account *** that in windows 8 that it be easier to remote access in to a computer and the do the same thing with android fones though but then u would need the gmail… and its easy to find out woes email is who with things like facebook. firefox old used it alot before google chrome came out shity thing was having to download flash player good thing was the cool app and programs made for firefox.. saw on a few government site *** like Google analysis… but i think that therz more to it becuz like outher ways the nsa been spying i mean the pic shows web came or video feed so they could be like watching one wen they go to the grocery store and lisening on there cell phone… and is not hard to lisen to sumone fone call that jus old spying so weird that they say they jus get the call time and the fon numbers in the phone call… i heard once that it not hard to turn on the microphone of a fon to easdrop and to have it wear the phone jus look like in standby…

    • narnia

      I have managed to decipher a couple of things from your obfuscated message. I’ll try and provide you some clarification.

      Windows is closed source, there is very likely backdoors present in their OSs and other software. Microsoft have already handed over the encryption keys of Outlook.com to the NSA. The NSA apparently even have absolute access to Microsoft’s development servers.

      Android is a very different story. It is built on the Linux kernel. The Linux kernel is (probably) secure, its open source, and there are many eyes watching over every single commit. Although Linus Torvalds has admitted recently that he has been approached to install backdoors into Linux, there is no evidence to say this ever happened. Android itself is built of many open source components. If your vendor supplied Android is not open enough for you, jailbreak your device and use an Android Open Source Project build.

      Clear your head of paranoia. If you don’t understand what’s happening, don’t just invent your own understanding.

      Common sense should tell you, the battery drain alone of using a mobile phone for eavesdropping would be a tell tale sign to anyone concerned in these matters. Nobody is turning on phones to record and transmit background noise, unless maybe you are some underground crime lord… in which case your phone has already been compromised and you should get out the country, fast.

  14. gunblade

    ooh they also make good use of static and amkami i think that wen u log into facebook or visit facebook the nsa then add *** like cookies to the web browser then they can have file and programs run from the browser.. hear like the a part of the scrip

    /*
    Brian Katz, Cardinal Path – Google Analytics Government Wide Site Usage Measurement
    * v0.1 121011 : First Test Version
    * v1.0 121012 : Added Cookie Synchronizing and filtered out Outbound tracking of cross- and sub-domain links
    * v1.1 121015 : Changed cross-domain to use setAllowAnchor and fixed problem with some links
    * v1.2 121015-2 : Added incoming cross-domain tracking to default _gaq tracker by adding _setAllowLinker and _setAllowAnchor
    * v1.3 121015-3 : All Cross-domain Tracking removed
    * v1.4 121015-4 : Multiple Search parameters and XDT links tracked as events

  15. gunblade

    and idk wat urchin and gas do but think gas is jus used with google to tracking and an easy way to add cookies…

  16. gunblade

    was thinking u no how google does like a search of the web think nsa using it to do the same jus search like civilian computers or to track if people do weird searches….

    • narnia

      This in some ways is correct! If it helps to think of it like this then fine.

      Google indexes the public web. The NSA indexes the private web.

      But don’t be so naive as to think only Google, NSA and other search providers are doing this. The NSA directly employs many private companies that also specialise in this new trend of “big data”. Anyone can write a bot, connect it via Tor and start tracking the public or private web.

      • gunblade

        yea crazy.. i been noticing sometimes my search fileds seems like they getting filtered like i search one time then i search a lil later and like cant find what was wen i first search i thought well that google show like the result of popular fields but went going to the next pages and couldn’t find it…

  17. gunblade

    there also was like a script that sad sumthing about monitery people that visited the sites for 6 months