Hacker News
- Attacking Tor: How the NSA targets users' online anonymity http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity 176 comments
- Attacking Tor: how the NSA targets users' online anonymity. Secret servers and a privileged position on the internet's backbone used to identify users and attack target computers. http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity 15 comments privacy
- Attacking Tor: how the NSA targets users' online anonymity | World news http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity 130 comments netsec
Linking pages
- NSA and GCHQ target Tor network that protects anonymity of web users | The NSA files | The Guardian http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption 119 comments
- GHCQ Targets Engineers with Fake LinkedIn Pages - DER SPIEGEL http://www.spiegel.de/international/world/ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html 67 comments
- Our Government Has Weaponized the Internet. Here's How They Did It | WIRED http://www.wired.com/opinion/2013/11/this-is-how-the-internet-backbone-has-been-turned-into-a-weapon/ 12 comments
- Online privacy is dead http://money.cnn.com/2013/10/17/technology/online-privacy/index.html?iid=hp_ln 10 comments
- The Feds Found The Silk Road's Ross Ulbricht Thanks To A Leaky CAPTCHA • TechCrunch http://techcrunch.com/2014/09/06/the-feds-found-the-silk-roads-ross-ulbricht-thanks-to-a-leaky-captcha/?ncid=tcdaily 9 comments
- NSA 'Cyber Weapons' Leak Shows How Agency Prizes Online Surveillance Over Online Security http://reason.com/archives/2016/08/30/shadow-brokers-nsa-exploits-leak 4 comments
- How the NSA Thinks About Secrecy and Risk - The Atlantic http://www.theatlantic.com/technology/archive/2013/10/how-the-nsa-thinks-about-secrecy-and-risk/280258/ 4 comments
- How The NSA Deploys Malware: An In-Depth Look at the New Revelations | Electronic Frontier Foundation https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations 2 comments
- Charges that Canada spied on Brazil unveil CSEC's inner workings - The Globe and Mail http://www.theglobeandmail.com/news/world/brazil-spying-report-spotlights-canadas-electronic-eavesdroppers/article14720003/ 1 comment
- NSA and GCHQ target Tor network that protects anonymity of web users | The NSA files | The Guardian http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption?CMP=ema_follow 0 comments
- NSA tried and failed to compromise Tor, but browser vulnerabilities gave some users away - The Verge http://www.theverge.com/2013/10/4/4802512/nsa-failed-to-compromise-tor-network-but-exploited-browser-vulnerabilities 0 comments
- Seeking Mount Doom – PJ Media http://pjmedia.com/richardfernandez/2014/11/07/seeking-mount-doom/ 0 comments
- Essays: How to Design—And Defend Against—The Perfect Security Backdoor - Schneier on Security https://www.schneier.com/essays/archives/2013/10/how_to_design_and_de.html 0 comments
- The importance of strong and fast cryptography https://blog.pfsense.org/?p=1724 0 comments
- Online privacy is dead http://money.cnn.com/2013/10/17/technology/online-privacy/index.html?section=money_technology 0 comments
- Everything you need to know about the NSA and Tor in one FAQ - The Washington Post http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/ 0 comments
- How the NSA Could Hack (Almost) Any Browser | by Nicholas Weaver | Medium https://medium.com/surveillance-state/1b5ab05ac74e 0 comments
Linked pages
- XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | The NSA files | The Guardian http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data 1506 comments
- Slate’s Use of Your Data http://www.slate.com/blogs/future_tense/2013/09/09/shifting_shadow_stormbrew_flying_pig_new_snowden_documents_show_nsa_deemed.html 19 comments
- How the NSA Could Hack (Almost) Any Browser | by Nicholas Weaver | Medium https://medium.com/surveillance-state/1b5ab05ac74e 0 comments
Related searches:
Search whole site: site:theguardian.com
Search title: Attacking Tor: how the NSA targets users' online anonymity | NSA | The Guardian
See how to search.