• Quote of the week

    By 1850, the House of Rothschild represented more wealth than all the families of Europe. Shortly after he formed the Bank of England, William Patterson lost control of it to Nathan Rothschild and here is how he did it:

    “Nathan Rothschild was an observer on the day the Duke of Wellington defeated Napoleon at Waterloo, Belgium. He knew that with this information he could make a fortune. He later paid a sailor a big fee to take him across the English Channel in bad weather. The news of Napoleon’s defeat would take a while to hit England. When Nathan arrived in London, he began selling securities and bonds in a panic. The other investors were deceived into believing that Napoleon won the war and was eyeing England so they began to sell their securities too. What they were unaware of is that Rothschild’s agents were buying all the securities that were being sold in panic. In one day, the Rothschild fortune grew by one million pounds. They literally bought control of England for a few cents on the dollar. The same way the Rockefeller’s went into Japan after World War 2 and bought everything 10 cents on the dollar. SONY=Standard Oil New York, a Rockefeller Company.”

    — Dr. Ken Matto (History of Lies, Thievery, and Deceit)

Tor Project ‘Almost 100% Funded by the US Government’: FOIA

The FOIA documents also suggest that Tor’s ability to shield users from government spying may be nothing more than hot air.

(ZHE— The Tor Project – a private nonprofit known as the “NSA-proof” gateway to the “dark web,” turns out to be almost “100% funded by the US government” according to documents obtained by investigative journalist and author Yasha Levine.

 

The Tor browser, launched in 2001, utilizes so-called “onion routing” technology developed by the US Navy in 1998 to provide anonymity over computer networks.

In a recent blog post, Levine details how he was able to obtain roughly 2,500 pages of correspondence via FOIA requests while performing research for a book. The documents include strategy, contract, budgets and status updates between the Tor project and its primary source of funding; a CIA spinoff known as the Broadcasting Board of Governors (BBG), which “oversees America’s foreign broadcasting operations like Radio Free Asia and Radio Free Europe.”

By following the money, I discovered that Tor was not a grassroots. I was able to show that despite its indie radical cred and claims to help its users protect themselves from government surveillance online, Tor was almost 100% funded by three U.S. National Security agencies: the Navy, the State Department and the BBG. Following the money revealed that Tor was not a grassroots outfit, but a military contractor with its own government contractor number. In other words: it was a privatized extension of the very same government that it claimed to be fighting.

The documents conclusively showed that Tor is not independent at all. The organization did not have free reign to do whatever it wanted, but was kept on a very short leash and bound by contracts with strict contractual obligations. It was also required to file detailed monthly status reports that gave the U.S. government a clear picture of what Tor employees were developing, where they went and who they saw. Yasha Levine

The FOIA documents also suggest that Tor’s ability to shield users from government spying may be nothing more than hot air. While no evidence of a “backdoor” exists, the documents obtained by Levine reveal that Tor has “no qualms with privately tipping off the federal government to security vulnerabilities before alerting the public, a move that would give the feds an opportunity to exploit the security weakness long before informing Tor users.”

 

Exit nodes

Cybersecurity experts have noted for years that while Tor may be technically anonymous in theory – the ‘exit nodes’ where traffic leaves the secure “onion” protocol and is decrypted can be established by anyone – including government agencies.

Anyone running an exit node can read the traffic passing through it.

In 2007 Egerstad set up just five Tor exit nodes and used them to intercept thousands of private emails, instant messages and email account credentials.

Amongst his unwitting victims were the Australia, Japanese, Iranian, India and Russia embassies, the Iranian Foreign Ministry, the Indian Ministry of Defence and the Dalai Lama’s liaison office.

He concluded that people were using Tor in the mistaken belief that it was an end-to-end encryption tool.

It is many things, but it isn’t that.

Dan Egerstad proved then that exit nodes were a fine place to spy on people and his research convinced him in 2007, long before Snowden, that governments were funding expensive, high bandwidth exit nodes for exactly that purpose. –Naked Security

Interestingly, Edward Snowden is a big fan of Tor – even throwing a “cryptoparty” while he was still an NSA contractor where he set up a Tor exit node to show off how cool they are.

 

In a 2015 interview with The Intercept’s (Wikileaks hating) Micah Lee, Snowden said:

LEE: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing?

SNOWDEN: I think Tor is the most important privacy-enhancing technology project being used today.

“Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.”

Interesting…

By Tyler Durden / Republished with permission / Zero Hedge / Report a typo

This article was chosen for republication based on the interest of our readers. Anti-Media republishes stories from a number of other independent news sources. The views expressed in this article are the author’s own and do not reflect Anti-Media editorial policy.

 

Source: Tor Project ‘Almost 100% Funded by the US Government’: FOIA

The Department of Justice is dropping all charges in a child-porn case rather than release the details of a hack against Tor.

To keep Tor hack source code secret, DOJ dismisses child porn case
DOJ: “Disclosure is not currently an option.”
By Cyrus Farivar, ARS Techica, Mar 5, 2017
https://arstechnica.com/tech-policy/2017/03/doj-drops-case-against-child-porn-suspect-rather-than-disclose-fbi-hack/

Alternatives to Tor for all platforms with any license
http://alternativeto.net/software/tor/

Even if you use “public WiFi access, “the BIOS can give you up”, as can logging into any account you have. One exception is IF you reflash your BIOS with an Open Source version. And I strongly SUSPECT that the BIOS in the individual computers that run TOR were / are the problem with TOR users being tracked.
In reference see:
http://www.fsf.org/campaigns/free-bios.html

Courtesy: Toxic Reverend

761total visits,2visits today

Leave a Reply

  • Similar Posts

  • Famous Quotes In History

    “All our law is private law, written by The National Law Institute, Law Professors, and the Bar Association, the Agents of Foreign Banking interests. They have come to this position of writing the law by fraudulently deleting the “Titles of Nobility and Honour” Thirteenth Amendment from the Constitution for the United States, creating an oligarchy of Lawyers and Bankers controlling all three branches of our government. Most of our law comes directly through the Hague or the U.N. Almost all U.N. treaties have been codified into the U.S. codes. That’s where all our educational programs originate. The U.N. controls our education system. The Federal Register Act was created by Pres. Roosevelt in 1935. Title 3 sec. 301 et seq. by Executive Order. He gave himself the power to create federal agencies and appoint a head of the agency. He then re-delegated his authority to make law (statutory regulations) to those agency heads. One big problem there, the president has no constitutional authority to make law. Under the Constitution re-delegation of delegated authority is a felony breach. The president then gave the agencies the authority to tax. We now have government by appointment running this country. This is the shadow government sometimes spoken about, but never referred to as government by appointment. This type of government represents taxation without representation. Perhaps this is why some people believe the Constitution was suspended. It wasn’t suspended, it was buried in bureaucratic red tape.”
    — David M. Dodge

    ” I know that most men, including those at ease with problems of the greatest complexity, can seldom accept even the simplest and most obvious truth if it be such as would oblige them to admit the falsity of conclusions which they have delighted in explaining to colleagues, which they have proudly taught to others, and which they have woven, thread by thread, into the fabric of their lives. ”
    — Leo Tolstoy

     

    Past Famous Quotes | Archive

  • What's New

    What's New
    Milestones: The De-Program Network has surpassed 100,000,000 visits since January 1, 2018 & there is still 9 days left for the month of January with 4112 unique URLs in 4855 links & growing.
    Big SHOUT OUT for all of you who helped make it possible.
    Reformatting of Wisdom & Freedom Little Books I II & III began fall of 2017.
    The De-Program Network Mind Map can be found at the bottom of the Projects tab called theBrain.
    Until we "officially" open: Enter at your own risk.

    Featured Article

    Featured Article
    Periodically there comes along an article that everyone should read. The link below is updated regularly with stellar works that can't be missed.