[liberationtech] Anonymity Smackdown: NSA vs. Tor

Guido Witmond guido at witmond.nl
Wed Aug 7 12:46:15 PDT 2013


On 07-08-13 20:47, Jonathan Wilkes wrote:

> 
> Anyone outside of the VPS and the attacker cannot know whether that 
> relay/exit node has been patched.  Now just work with the NSA's
> equivalent in the country of the exit node to make sure the VPS
> remains unaware of any shenanigans (and why wouldn't they?).  If they
> do see something weird happening from the patch and make some noise 
> about it then just gag them as the Guardian reports show they are
> quite good at doing.

No need to gag, thank the VPS provider publicly for spotting the hacked
node.

Then run a Freenet/bittorrent/I2P/etc node on it to hide the spooks
traffic and sniff that with their fiber taps.


> 
> Roger-- how exactly would you check to make sure something like this 
> scenario isn't happening?

Hmm, That would be easy. Place some false flag mails about terrorist
attacks and check for raised alerts... :-)

Guido.

PS. The best thing is to discourage plaintext protocols. Encrypt
everything. Then the spooks have *only* the metadata if they manage to
trace the Tor paths end to end.



More information about the liberationtech mailing list