If SSCI 702 bill goes forward, it will be enabling moment to turn our IC into something far worse than Stasi. I don't say that lightly.
-
-
So bulk collect (remember, they can keep anything encrypted anyway), & sort through what they want, I THINK. (As I said don't get tech side)
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I've done bulk collection at Tor exits. While sometimes you can get lucky, it's not a big privacy invasion.
-
What do you do with it then?
-
And can you talk me through how NSA is doing it, then? Assume they're taking every node that FBI or a friendly doesn't run.
-
1/ Well,
@puellavulnerata would have a lot of insights I don't have, but I'll give the stuff I know about. -
2/ The bulk of their monitoring is just "connection" metadata: traffic from an exit node going to an IP address.
-
3/ They'll also have connection records going into an entrance node. They can then match up entrance with exit records.
-
Note they've also redefined DRAS (from PRTT) to include stuff further down the packet.
-
Yes, email, HTTP, and SSL headers are almost certainly covered by DRAS. It's not an unreasonable view.
- 5 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.