[ExI] Attacking Tor: how the NSA targets users' online anonymity

Mike Dougherty msd001 at gmail.com
Wed Oct 9 12:24:17 UTC 2013


On Wed, Oct 9, 2013 at 5:37 AM, Eugen Leitl <eugen at leitl.org> wrote:

>
> (Use VM jails with amnesiac distros like Tails for daily browsing,
> separate security compartments using CubeOS and related, use air
> gap with USB sneakernet (using *nix with no USB autorun) to
> encrypt/decrypt and maintain sensitive information in general).
>
>

> According to a top-secret operational management procedures manual, FoxAcid
> servers configured to receive callbacks are codenamed FrugalShot. After a
> callback, the FoxAcid server may run more exploits to ensure that the
> target
> computer remains compromised long term, as well as install "implants"
> designed to exfiltrate data.
>
> By 2008, the NSA was getting so much FoxAcid callback data that they needed
> to build a special system to manage it all.
>

This reads like a really bad cyberpunk story
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.extropy.org/pipermail/extropy-chat/attachments/20131009/3a10dc35/attachment.html>


More information about the extropy-chat mailing list