Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Anonymous Jihad After NSA leaks Jihadists flock to federally funded Tor network to hide
Free Beacon ^ | 7/1/13 | Lachlan Markay

Posted on 07/01/2013 10:01:22 AM PDT by Nachum

Jihadists are seeking out more secure methods of online communications, including an avenue created by the U.S. government and financed by American taxpayers, in the wake of revelations about the U.S. monitoring of online messages.

The Tor network has become a go-to means for jihadists and criminals to communicate, raise money, and buy and sell illicit goods and services without fear of being identified or traced by intelligence or law enforcement officials.

The network uses technology called “onion routing” (Tor is an acronym for The Onion Router), which refers to layers of encryption that prevent governments or other users from obtaining information about users or websites hosted on the network.

(Excerpt) Read more at freebeacon.com ...


TOPICS: News/Current Events
KEYWORDS: jihadists; leaks; nsa; tor
Full title: Anonymous Jihad After NSA leaks Jihadists flock to federally funded Tor network to hide activities
1 posted on 07/01/2013 10:01:22 AM PDT by Nachum
[ Post Reply | Private Reply | View Replies]

To: Nachum

I accepted long ago that there is no such thing as internet security. Just look at the targetted ads that follow you where-ever you go.


2 posted on 07/01/2013 10:04:05 AM PDT by grania
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

Oh sure, the NSA, DOD and the rest of the government created the TOR
Network, but don’t have the Keys. Sure, and I have bridge for sale ...


3 posted on 07/01/2013 10:05:45 AM PDT by Kozak (The Republic is Dead. We now live in a Judicial Tyranny.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: grania

“Just look at the targetted ads that follow you where-ever you go.”

Clear out all your cookies, then install and use Ghostery. Ghostery keeps all those trackers that enable the ad targeting from ever getting embedded on your computer. I learned about Ghostery on Free Republic, and I would recommend it to everyone else.

Get Ghostery for free here:

http://www.ghostery.com/


4 posted on 07/01/2013 10:13:03 AM PDT by USFRIENDINVICTORIA
[ Post Reply | Private Reply | To 2 | View Replies]

To: Kozak

TOR isn’t about keys, it’s about decentralization. Encrypted communications can be cracked with the right quantum computing mechanism. If you’re using >1024 bit encryption with highly complex passwords, no amount of government computing power could crack your encryption in a timely manner. If they REALLY wanted to dedicate processing cycles to decryption, they could crack it in a couple days, but even the best computing resources don’t have the chops to decrypt 2048-bit encryption with a >20 character private key in less than 30 days.


5 posted on 07/01/2013 10:16:50 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: USFRIENDINVICTORIA
Yes www.ghostery.com/‎
6 posted on 07/01/2013 10:17:19 AM PDT by listenhillary (Courts, law enforcement, roads and national defense should be the extent of government)
[ Post Reply | Private Reply | To 4 | View Replies]

To: USFRIENDINVICTORIA; grania
"Get Ghostery for free... "

I concur.

7 posted on 07/01/2013 10:40:14 AM PDT by Paladin2
[ Post Reply | Private Reply | To 4 | View Replies]

To: USFRIENDINVICTORIA
I use Malwarebytes. Never had any malware or spyware problem. My friend just
checked his computer and found four adware programs. Now he's angry
at the virus protection program it bypassed and he has no idea how long the malware has been on his computer. I also use Ixquick for searching
and avoiding Google and the rest like the plague.
8 posted on 07/01/2013 10:45:20 AM PDT by MaxMax (If you're not pissed off, you're not paying attention)
[ Post Reply | Private Reply | To 4 | View Replies]

To: rarestia

Very confident....

Computing power has surpassed your wildest dreams, I’m afraid.


9 posted on 07/01/2013 11:16:33 AM PDT by Nabber
[ Post Reply | Private Reply | To 5 | View Replies]

To: rarestia

The only quantum computers out there today are all Adiabatic quantum machines. There are some 512 qubit machines made in Canada and some of those are in the US but adiabatic just ain’t gonna cut it for factoring primes and similar problems..IMO.

They would need REAL quantum computers.

The Canadian D-Wave 512 qubit machine cannot factor primes as fast as a home-made array of graphics cards in a geeks basement.


10 posted on 07/01/2013 11:18:53 AM PDT by Bobalu (It is not obama we are fighting, it is the media.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Nabber

I work in IT. I’ve been an engineer in data center construction, programming, systems and networks, and security. I can tell you personally that encryption can be cracked with enough time, but there are no supercomputers available on the quantum level yet and even those would require more than 24 hours to crack a 2048-bit encryption cipher.


11 posted on 07/01/2013 11:29:12 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Bobalu

Thank you for confirming this. True quantum computing is a few years if not decades away.


12 posted on 07/01/2013 11:30:02 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Nachum
Yes, TOR is being used by jihadists. But don't forget, it can also be used by freedom fighters. It would behoove the opponents of tyranny to become as familiar with TOR as are the jihadists.
13 posted on 07/01/2013 11:34:17 AM PDT by JoeFromSidney ( New book: RESISTANCE TO TYRANNY. Buy from Amazon.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

The weakest link in TOR is the last computer in your proxy chain.

Your communications comes out of that machine without encryption unless your target machine on the internet is SSL.

The next weakest link is you are able to be tracked by traffic analysis. It’s best for you if you run a TOR node since you are then handling traffic all the time and it’s impossible to filter out any traffic as being from you.

Next best thing to running a node is to not just jump on and start surfing...run TOR a while and do casual unimportant stuff on the connection and switch identities a few times and then later do anything sensitive... I prefer to get an exit node that is outside the US, Canada, UK, AUS, NZ....

Some people use a commercial proxy chain or VPN to then connect to TOR..this may be a bit more secure than TOR alone. try the free version of the VPN at http://proxpn.com/ it’s speed limited in the free version but adequate for web browsing.

Before using TOR for anything truly sensitive read all the relative info on the TOR site first!

I have a PC that is on the other side of the hardware firewall... I use it as a honeypot so I can watch and see who is interested in probing my ip. I have seen a lot of interesting stuff. There are tons of Chinese hacker attacks... I’d be surprised if a machine could stay uninfected for more than an hour without a firewall. A strange series of probes once occurred after I made a post on FR.... I went back and checked and a relatively new freeper had placed an image in a thread that was pointed to a server with a plain ip address. This was probably a server on their PC that was serving up the image and they were looking at the logs and probing the ip of anyone who read the thread.

My main PC is behind the firewall plus once a day it gets reloaded from a disk image so it’s always shiny and new... nothing stays put and nothing can alter eeprom on the mainboard or the HD boot sector. Data to be saved is sent to an external encrypted drive. The real machine is Linux, the honeypot is Windows ;-)


14 posted on 07/01/2013 11:52:45 AM PDT by Bobalu (It is not obama we are fighting, it is the media.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu

The entire intelligence community comes and probes FR. I know this because on my website’s site meter, I see their IP’s plainly bouncing from FR to my site. They do not hide themselves either. I have nothing to hide so I truly do not care, but it is unsettling to see it so blatantly there.

They also (probably) download and save everything that is posted.


15 posted on 07/01/2013 12:11:26 PM PDT by Nachum (The Obama "List" at www.nachumlist.com)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Nachum

What is your website?


16 posted on 07/01/2013 12:18:22 PM PDT by Bobalu (It is not obama we are fighting, it is the media.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Bobalu

http://www.nachumlist.com/


17 posted on 07/01/2013 12:26:10 PM PDT by Nachum (The Obama "List" at www.nachumlist.com)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Nachum

Bttt


18 posted on 07/01/2013 12:53:50 PM PDT by VanShuyten ("a shadow...draped nobly in the folds of a gorgeous eloquence.")
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson