No TOR for the Masses?
Recently Techspot India reported that the NSA doesn’t want us civilians using the TOR technology —
NSA classifies Linux Journal readers, Tor and Tails Linux users as “extremists”
Funny how TOR was originally developed by the Naval Research Laboratory and furthered by DARPA. Now that it’s out of the bag, they want to put it back under their exclusive control. Sort of like the internet itself.
Of course, the govvies probably won’t mind too much if political figures with ties to George Soros and the Saudi royal family use it. At least they didn’t seem to mind when a certain former senator turned Secretary of State mishandled classified information on a private home-based server, so I’m guessing that they’ll sign off on corrupt use of the TOR tech as well, just so long as it’s the “right people” using it.
FOR FURTHER REFERENCE
NOTES
- Approximate reading level – 11.7
- Reposted –
- Extropy Unbound – Facebook / WordPress.com
- The Weekly Sedition – Facebook / Twitter / WordPress.com
- Libertarian Party –
Copyright © 2016 Libertarian Party of New Mexico, Libertarian Party of Bernalillo County, New Mexico and Mike Blessing. All rights reserved.
Produced by KCUF Media, a division of Extropy Enterprises.
This blog entry created with medit and Notepad++.
Join The Discussion
1 CommentThoughts? Comments?
Please login or register to post a comment.
dL 1337 July 12, 2016 , 2:07 am
The TOR project still remains largely funded by the US government. And it wouldn’t be of much use to the US government if it is only used by the US govt approved foreign dissidents(then it would only serve as an easy red flag).
What the US intel organs now want in the open(what used to be in secret before Snowden) is the legality to hack into anyone’s computer computer caught using TOR or a VPN. That is to say, if you are caught using TOR or a VPN, it is sufficient probable cause for the spooks and the police to hack into your computer(or at least try to). Now, if they fail to hack you, that then will really put you under suspicion.
Now, it doesn’t mean that if you use obfuscation methods that you will automatically be hacked. Indeed, it could be a possibility that within a reasonable time frame quite a bit of internet traffic will be tunneled. It simply means that if you pop onto their radar for whatever reason, your obfuscation methods likely won’t help you. Indeed, the better you are at, the more red flags you likely will trigger. If they can’t hack you, then they will likely show up at your door with a standard warrant looking for whatever dirt they can find.