in

How the NSA goes after Tor and their users

By now, everyone has heard about the NSA’s attempts to break through the anonymity maker, Tor. If you haven’t, it’s probably because it got lost in the midst of other NSA privacy-attacking stories. Now, let’s take a look at the ins and outs of how and why.

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA’s application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.

According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identified Tor users on the internet and then executes an attack against their Firefox web browser.

What do you think?

Avatar of Rocco Penn

Written by Rocco Penn

A tech blogger, social media analyst, and general promoter of all things positive in the world. "Bring it. I'm ready." Find me on Media Caffeine, Twitter, and Facebook.

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Affordable internet for ALL

Twitter updates welcome screen so prospective investors can “get” them