702 bill the House just passed codifies the government's ability to use 702 to collect DOMESTIC communications from Tor and VPNs and use them for 8 enumerated crimes. https://www.emptywheel.net/2017/10/23/the-senate-intelligence-committee-702-bill-is-a-domestic-spying-bill/ …
-
Show this thread
-
Those crimes are: -death -kidnapping -serious bodily harm -child porn -critical infrastructure -cyber (including the horrible CFAA) -transnational crime (which will include drug dealing) -human trafficking (which can include prostitution)
8 replies 61 retweets 52 likesShow this thread -
Worse still, it also lets the government use this Tor exception to spy on anyone or anything the AG deems related to national security. This authority is, under this bill, non reviewable. That means Jeff Sessions gets UNREVIEWABLE authority to spy on anyone using Tor.
10 replies 187 retweets 157 likesShow this thread -
65 Democrats just voted in favor of Jeff Sessions having that unreviewable authority. http://clerk.house.gov/evs/2018/roll016.xml …
25 replies 332 retweets 289 likesShow this thread -
I'm actually very sympathetic to arg FBI should have a way to access Tor and VPN traffic (they use subpoenas for the latter for regular old crimes); I suspect getting this authority has been key to success w/Dark Markets. But not doing so in a pretend foreign spying bill.
2 replies 21 retweets 59 likesShow this thread -
Replying to @emptywheel
Technologically speaking, how vulnerable would a VPN like PIA or similar be to FISA? What about encrypted comm like Signal? Since both don't keep logs and are encrypted, does the FBI (or other state actors) have the ability to decrypt the traffic?
1 reply 3 retweets 3 likes -
Replying to @aaronmhill
Not sure how they're doing this technically. I think they collecting entrance and exit traffic to Tor, and probably similar for any VPN that isn't cooperating w/USG--but I think they do, in PRISM like fashion.
2 replies 1 retweet 1 like -
Replying to @emptywheel @aaronmhill
My educated guess is that the govt is bypassing Signal encryption, possibly through Apple.
1 reply 3 retweets 2 likes -
Replying to @emptywheel
by capturing the traffic before it gets to the app? It was my understanding that was the only way for the data to be compromised, since they don't keep logs
1 reply 1 retweet 1 like
When they say they don't keep logs they mean they don't say what you're doing but they do track when you're accessing the site. I suspect under 702 they give more.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.