miércoles, 23 de marzo de 2016

Is TOR Browser an NSA "Honeypot"?  - The Last American Vagabond

Is TOR Browser an NSA "Honeypot"?  - The Last American Vagabond





Is TOR Browser an NSA “Honeypot”? 

 

With the continuing rise of Little
Brother’s Truth Movement, internet anonymity (for personal and activist
reasons) has quickly moved itself to the forefront of some of the most
crucial and immediate debates of present day–and far from being a
clear-cut answer, whether or not internet Anonymity is a technically
feasible possibility is still being answered conclusively. 

Becoming the primary Gateway to the “Deep
Web/Dark Net” servers of the Internet, Tor Browser and its
“onion-layered encryption” has become a primary focus of this debate.
Since the Internet itself was developed by DARPA, and Tor was in turn
developed by US Naval Intelligence, it is unfortunately something that
will never truly be able to get answered unless/until there is some
definitive source documents that leak, implying the US Government’s true
lack of control over Tor. Granted, there were some Snowden files
released stating just this, but a few years have already passed since
then, and in any case, Snowden is an ambiguous character to begin with.
On the other hand, the extensive amount of illegal black-market exchange
on the Tor browser could just as easily suggest this lack of control
already. Hence, the convolution of the debate. 

For those unfamiliar with how Tor works,
the onion-layered encryption is actually a fairly self-explanatory
title. Tor serves as a convolution of IP address data, and uses a
three-layer piggy back system that uses the entire population of IP
addresses on Tor, and this protocol is activated at the “Entry/Exit
Nodes” of the servers. This is to say that, using all people logged onto
the browser, Tor will toss your “identity” through the “identity” of
other people three more times before you reach your destination.

Now, from a technical point-of-view, this
is an incredibly basic, but incredibly nifty form of what could be
called, “internet inconspicuousness” but the reality of the matter is
that Tor itself is not enough for literal anonymity. Let’s set aside the
following possibilities for a moment: that the US Government has the
ability to decrypt Tor data; that US Government has not inherently
written backdoors into their Naval Intelligence technology; that the US
Government couldn’t access an IP address’ data by using the backdoor of
the computing device itself.