Imagine i download a 1-gigabyte file via VPN from a terrorist website. They want metadata (when this happened, how much data was transfered)
-
-
Replying to @ErrataRob @puellavulnerata
OK, we agree. But there must be SOME content they're getting via Tor. That explains their great dark market successes of late?
2 replies 0 retweets 0 likes -
Replying to @emptywheel @ErrataRob
Those have, *to public appearance*, been endpoint attacks. That doesn't rule out parallel construction to conceal the existence of a...
1 reply 0 retweets 0 likes -
...deanon attack, but it doesn't really support it either.
2 replies 0 retweets 0 likes -
Replying to @puellavulnerata @ErrataRob
No. But I'm not the tech expert. I've now said, yes, they are using 702 v Tor in US, under guise of FII. How would they use it?
1 reply 0 retweets 0 likes -
And where is the "upstream" collection point?
2 replies 0 retweets 0 likes -
Replying to @emptywheel @puellavulnerata
Tor entry/exit nodes are maintained by independent people all over the world, so there's not "upstream" location.
1 reply 0 retweets 1 like -
-
Replying to @emptywheel @puellavulnerata
There's no one place, or even thousands of places, the NSA can tap in to see all Internet traffic.
3 replies 0 retweets 0 likes -
not even with trunk line mirroring of cooperating Level 1 cable providers? guesstimating >80% is sec filtered nowdays
1 reply 0 retweets 0 likes
Assume trunk line monitoring.
-
-
mirroring ... via beam splitters on all major optic fiber routes installed when *cough* boat anchors *cough* dragged subsea cables
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.