I think they're bulk collecting at exit nodes. This the inclusion of so many in the DNC hack JAR. They're all RU facilities now!!!!
-
-
I'm not sure I understand the question. All targeting VPNs gets you is metadata.
-
Imagine i download a 1-gigabyte file via VPN from a terrorist website. They want metadata (when this happened, how much data was transfered)
-
OK, we agree. But there must be SOME content they're getting via Tor. That explains their great dark market successes of late?
-
Those have, *to public appearance*, been endpoint attacks. That doesn't rule out parallel construction to conceal the existence of a...
-
...deanon attack, but it doesn't really support it either.
-
No. But I'm not the tech expert. I've now said, yes, they are using 702 v Tor in US, under guise of FII. How would they use it?
-
And where is the "upstream" collection point?
-
Also what do they get from VPNs and any Tor exit notes that want to play along as PRISM providers, but that's another issue.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.