XPost: alt.privacy.anon-server   
   From: nobody@dizum.com   
      
   In article <524ab7bd2c1f958e741cfecefbee1c5f@erienetworks.net>   
   Anonymous wrote:   
   >   
   > The National Security Agency uses a bit of jiu-jitsu to turn the   
   > structure of Web ad networks against people who run Tor to remain   
   > anonymous.   
   >   
   > Just because the National Security Agency hasn't cracked the   
   > anonymizing service Tor doesn't mean that people who use the   
   > service are free from surveillance.   
   >   
   > The NSA has been able to use ad networks like Google's, and The   
   > Onion Router's own entry and exit nodes on the Internet, to follow   
   > some Tor users, according to a new report based on documents   
   > leaked by whistleblower Edward Snowden and obtained by security   
   > researcher Bruce Schneier with the Guardian. Tor is primarily   
   > funded by the US State Department and the Department of Defense,   
   > home of the NSA.   
   >   
   > https://www.cnet.com/news/privacy/nsa-tracks-google-ads-to-find-   
   > tor-users/   
      
   https://www.cnet.com/news/privacy/nsa-tracks-google-ads-to-find-tor-   
   users/   
      
   "The NSA buys ads from ad display companies like Google and seeds   
   them around Tor's access points.   
      
   "The NSA then cookies that ad, so that every time you go to a site,   
   the cookie identifies you. Even though your IP address changed   
   [because of Tor], the cookies gave you away," he said."   
      
   For Chrissakes! Empty your cookies after a session. I even empty mine   
   a number of times throughout an online session. And the most obvious   
   way to help staying unidentified is DON'T USE GOOGLE SEARCH. If you   
   use Facebook and the tons of other stuff, lot's of luck.   
      
   Follow strictly the Tor's site of how to use Tor and how NOT to use   
   it.   
      
   "More secure than either, Hansen said, was to run Tor on a virtual   
   machine so that cookies and cache are dumped when the machine is   
   closed, and the kind of man-in-the-middle and man-on-the-side attacks   
   described by Schneier are avoided."   
      
   The above is why I run a virtual C: drive. Nothing sticks to the C:   
   on reboot.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   
|