[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] XKeyscore sees 'nearly EVERYTHING you do online
- To: Gary Baribault <gary@xxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] XKeyscore sees 'nearly EVERYTHING you do online
- From: XF <theiemsolution@xxxxxxxxx>
- Date: Thu, 1 Aug 2013 21:51:32 +0200
Right. But where are their tap ? In Internet Exchange Point ? In AS ? And how
can they do that ? "Hello, I'm NSA, can I get a TAP on your network" :-) This
would say that ISP agree and the amount of data to transfer would be so vast .
How can they transfer all this amount of data into their system ??
Le 1 août 2013 à 20:56, Gary Baribault <gary@xxxxxxxxxxxxx> a écrit :
> Optically tapping ALL of the submarine cable going into and out of the U.S.
> would still not give them ALL of the claimed data. They have to be tapping
> all of the major traffic exchange sites in the U.S. to get this kind of data.
>
> Gary B
>
> On 08/01/2013 11:31 AM, XF wrote:
> > Did you understood how they
> collect data ? This is not clear for me...ISP backdoor ? Optical
> tap on sub marine wire ?
>
> >
>
> > Le 1 août 2013 à 16:26, Georgi Guninski
> <guninski@xxxxxxxxxxxx> a écrit :
>
> >
>
> >> it will be interesting to me what will remain of the nsa
>
> >> when the chinese comrades stop giving fresh money to the
> usa.
>
> >>
>
> >> Detroit news are not very pink.
>
> >>
>
> >> On Thu, Aug 01, 2013 at 11:20:27PM +1200, Hugh Davenport
> wrote:
>
> >>> meanwhile, in new zealand, prime minister suggests
> that we aren't
>
> >>> the slaves for nsa...
>
> >>>
>
> >>> On 2013-08-01 19:23, Georgi Guninski wrote:
>
> >>>> XKeyscore sees 'nearly EVERYTHING you do online
>
> >>>>
>
> >>>>
> http://www.theregister.co.uk/2013/07/31/prism_put_in_the_shade_by_leak_about_even_more_powerful_snoop_tool/
>
> >>>> New NSA tool exposed: XKeyscore sees 'nearly
> EVERYTHING you do online'
>
> >>>>
>
> >>>> From the presentation:
>
> >>>> * Show me all the exploitable machines in country
> X
>
> >>>>
>
> >>>> * How do I find a cell of terrorust that has no
>
> >>>> connection to known strong-selectors
>
> >>>> **Anomalous events
>
> >>>> ***Someone who is using encryption
>
> >>>>
>
> >>>> _______________________________________________
>
> >>>> Full-Disclosure - We believe in it.
>
> >>>> Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html
>
> >>>> Hosted and sponsored by Secunia -
> http://secunia.com/
>
> >>>
>
> >>> _______________________________________________
>
> >>> Full-Disclosure - We believe in it.
>
> >>> Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html
>
> >>> Hosted and sponsored by Secunia - http://secunia.com/
>
> >>
>
> >> _______________________________________________
>
> >> Full-Disclosure - We believe in it.
>
> >> Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html
>
> >> Hosted and sponsored by Secunia - http://secunia.com/
>
> >
>
> > _______________________________________________
>
> > Full-Disclosure - We believe in it.
>
> > Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html
>
> > Hosted and sponsored by Secunia - http://secunia.com/
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/