[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] XKeyscore sees 'nearly EVERYTHING you do online



Right. But where are their tap ? In Internet Exchange Point ? In AS ? And how 
can they do that ? "Hello, I'm NSA, can I get a TAP on your network" :-)  This 
would say that ISP agree and the amount of data to transfer would be so vast . 
How can they transfer all this amount of data into their system ??


Le 1 août 2013 à 20:56, Gary Baribault <gary@xxxxxxxxxxxxx> a écrit :

> Optically tapping ALL of the submarine cable going into and out of the U.S. 
> would still not give them ALL of the claimed data. They have to be tapping 
> all of the major traffic exchange sites in the U.S. to get this kind of data.
> 
> Gary B
> 
>  On 08/01/2013 11:31 AM, XF wrote:
> > Did you understood how they
>       collect data ? This is not clear for me...ISP backdoor ? Optical
>       tap on sub marine wire ? 
> 
>       >
> 
>       > Le 1 août 2013 à 16:26, Georgi Guninski
>       <guninski@xxxxxxxxxxxx> a écrit :
> 
>       >
> 
>       >> it will be interesting to me what will remain of the nsa
> 
>       >> when the chinese comrades stop giving fresh money to the
>       usa.
> 
>       >>
> 
>       >> Detroit news are not very pink.
> 
>       >>
> 
>       >> On Thu, Aug 01, 2013 at 11:20:27PM +1200, Hugh Davenport
>       wrote:
> 
>       >>> meanwhile, in new zealand, prime minister suggests
>       that we aren't
> 
>       >>> the slaves for nsa...
> 
>       >>>
> 
>       >>> On 2013-08-01 19:23, Georgi Guninski wrote:
> 
>       >>>> XKeyscore sees 'nearly EVERYTHING you do online
> 
>       >>>>
> 
>       >>>>
> http://www.theregister.co.uk/2013/07/31/prism_put_in_the_shade_by_leak_about_even_more_powerful_snoop_tool/
> 
>       >>>> New NSA tool exposed: XKeyscore sees 'nearly
>       EVERYTHING you do online'
> 
>       >>>>
> 
>       >>>> From the presentation:
> 
>       >>>> * Show me all the exploitable machines in country
>       X
> 
>       >>>>
> 
>       >>>> * How do I find a cell of terrorust that has no
> 
>       >>>> connection to known strong-selectors
> 
>       >>>> **Anomalous events
> 
>       >>>> ***Someone who is using encryption
> 
>       >>>>
> 
>       >>>> _______________________________________________
> 
>       >>>> Full-Disclosure - We believe in it.
> 
>       >>>> Charter:
>       http://lists.grok.org.uk/full-disclosure-charter.html
> 
>       >>>> Hosted and sponsored by Secunia -
>       http://secunia.com/
> 
>       >>>
> 
>       >>> _______________________________________________
> 
>       >>> Full-Disclosure - We believe in it.
> 
>       >>> Charter:
>       http://lists.grok.org.uk/full-disclosure-charter.html
> 
>       >>> Hosted and sponsored by Secunia - http://secunia.com/
> 
>       >>
> 
>       >> _______________________________________________
> 
>       >> Full-Disclosure - We believe in it.
> 
>       >> Charter:
>       http://lists.grok.org.uk/full-disclosure-charter.html
> 
>       >> Hosted and sponsored by Secunia - http://secunia.com/
> 
>       >
> 
>       > _______________________________________________
> 
>       > Full-Disclosure - We believe in it.
> 
>       > Charter:
>       http://lists.grok.org.uk/full-disclosure-charter.html
> 
>       > Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/