About Tor, allsorts and my story

Spread the love

I was thinking of deciphering this article on Tor for my readers. While it’s an interesting article it’s quite difficult to follow even if  you’re familiar with Tor.

There are a few interesting points like it’s never been possible to identify a tor user from a specific request and the way to go is to compromise (hack into) the user’s computer e.g. by luring them to a dodgy website. What the not possible to identify a user means is that it’s not been possible to go in reverse through tor from the e.g. website viewed. I was aware of government-funded sites that host malware – my previous blog was blacklisted with search engines because of comments with links (probably) to them.

Infection through a browser is a standard practice not necessarily involving the use of Tor. A possible attack vector would be to compromise (hack into) a cheap webhost and wait until the target webhost client connects to make a post. Cheap webhosts are not going to have good security: they’re cheap through cutting corners on everything. They’re certainly not going to be any match to government agencies.

Chances are that the software will not work straight away and the victim could notice some strange effects e.g. the keyboard not working properly until the spy software was tinkered with and tweaked. Somebody could very easily notice that their keyboard was playing up, especially when it returned to normal because that’s strange and unusual.

Anyway, in the prism and related documents that the article refers to there are many references to terrorists. It’s much easier to spy on perfectly law-abiding and respectable people if you first assign them to that category called suspected terrorist. I don’t like that label and I don’t like being spied on.

It seems to me that I may have to help to get rid of this label, so I’ll start by saying that it should be quite obvious that I have had an issue with alcohol. That’s a start. I’m likely to say far more which involves telling my story and also – by extension – involves identifying the real terrorists. They are former Home Secretaries, Prime Ministers and police chiefs. I am firmly of the opinion that there are very few real terrorists outside of government agencies because that is what my research and experience is telling me. Interested?

Edit: Can we have some relevant leaks please?

 

Leave a Reply