[TriLUG] Use Tails (Linux) or Tor? Your an Extremist

matt at noway2.thruhere.net matt at noway2.thruhere.net
Thu Jul 3 11:25:27 EDT 2014


>From a German article: http://www.tagesschau.de/inland/nsa-xkeyscore-100.html
Translated version here:
https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fwww.tagesschau.de%2Finland%2Fnsa-xkeyscore-100.html&edit-text=

Also available at rt.com (yes, I know):
http://rt.com/news/170208-nsa-spies-tor-users/

If you use Tor, or Tails, Big Brother has it's eye on you.  Kind of
reminds me of the case of the Command Line Interface Terrorist
(http://news.slashdot.org/story/09/04/14/193217/college-police-think-using-linux-is-suspicious-behavior)

I would guess that this mailing list comprises a real hot spot for them.

>From the article:

"Ironically, it is in accordance with the special rules that NDR and WDR
present, so just people with the desire for anonymity that are the target
of the NSA. In the eyes of the Secret Service: extremists. This is not
rhetoric, no journalistic escalation. The term is even in the Comment
column of the source text, quoted by programmers of the NSA."

"Extremists? The opposite is the case, as the search point. The German
victims are politically to find not at the outer edge. Extreme they are
alone on one point: They are concerned about the security of their data.
And that's what makes them suspect in the eyes of the U.S. Secret
Service."

"Because what the rules of the source code also revealed: The NSA observed
on a large scale search queries worldwide - also in Germany. Just the
simple search for anonymizing software such as "Tails" is enough to get
into the grid of the NSA. The connection of the request with search
engines makes suspicious. His search for "Tails" opens a door, access to
Darko and his world. Once in the database, any inquiry from Darko can be
accessed selectively. Darko is under observation."



More information about the TriLUG mailing list