Listen Sanya IV Litvyak
“Listen, if there is one thing the history of evolution the NSA leaks have taught us, it is that life the NSA will not be contained”
It has and it is being contained, Google, Apple, Microsoft, all of us in the Torrent community have gone to total at home, Work Storage System, we use Tor over Vpn’s and encrypt at the highest, unbreakable level, i personally have 11.5 terabytes on my home Server, all encrypted with Unbreakable “Elliptic curve cryptography (ECC)” our servers when we are not using them are in locked down mode, and the contents of our drives can not be unencrypted, not in this life at least.
We use, Serpent-Twofish-AES with primary and secondary 768 bit keys PKC5-5 PRF, HMAC-Whirlpool, randomized Tripe key construction.
Our VPN Proxies Use a, Yet to be approved, form of equal encryption. Before you say it “But the Tor Network was brought down!”, well no… “It was done by using a " JavaScript exploit.” The JavaScript code’s payload analyzed by reverse engineering and exploit developer Vlad Tsyrklevich, who reveals that it briefly connects to a server and sends the hostname and MAC address of the victim. "Briefly, this payload connects to 65.222.202.54:80 and sends it an HTTP request that includes the host name (via gethostname()) and the MAC address of the local host (via calling SendARP on gethostbyname()->h_addr_list). After that it cleans up the state and appears to deliberately crash. This was due to a security bug in Firefox 17, and users not using Tor correctly as they should.
As Tor say
“Tor protects your privacy on the internet by hiding the connection
between your Internet address and the services you use. We believe Tor is reasonably secure, but please ensure you read the instructions and configure it properly. If you use Tor Wrongly we can’t help you”
This next point i can not stress enough, Don’t use Tor on WindowZ, WindowZ has more holes in it then Swiss cheese, and Microsoft have helped The NSA understand how its core encryption works. Use Tails 0.22 with Tor! And no i don’t mean load up VMware and run it, make a bootable pen drive with it on it, and boot clean from your second computer.
When The Silk Road and Freedom Hosting were taken down by the FBI, With The NSA’s Help, every one said well it proves the Tor Network was compromised, but as we see it was not. Again it was Users not following Upgrading instructions and sloppy browsing habits, plus a lot of us feel there as a “Sneak and Peak” at Freedom Hosting a Breakin…
In fact it may surprise you to know, we have a list of over an entire class B network of ip address that GCHQ use, and the same with The NSA in there case they can pool from 4 class A networks. And mute point get a tunnel Broker and use ipv6…
This range is almost always used by exploits from the NSA put it in your blocked network section of your Firewall 65.192.0.0 - 65.223.255.255. Just a heads up.
You are right on one point, The NSA have an Open Budget of 10 Billion a year, and who knows what the Black Budget is… So yes they can go directly to IBM or AMD, Intel and get them to make chips that do nothing but try and ■■■■■ encryption. But the same Scientists that they employ are no better then the ones that develop the Mathematical Algorithms used in our encryption, its a catch me if you can game.
Until we can send Entangled Photons thru our fibre to insure our keys have not been tampered with, we will allways never be sure that most of our data is not being grabbed and recorded with sniffers.
But i can tell you this, all they will get from me is bad words, and Torrent info, and i already have lots of dmca notices. Lmao
I have digressed, My Main Point about Comodo using The UK as a Hosting County is still Valid, and i wounder why i have not had a good reason yet? It cant be cost, its much cheaper in Finland, i know we have servers there. If you want to know more about Prism and Tor i have tons of info on my main site at https://■■■■■■■-and-die.com
Please consider a donation to The Pirate Party!
One last mute point, we do use WindowZ Thats why we use Comodo, but the servers that use WindowZ are for users who want to host on WindowZ, My OS is Debian.
I hope i have not Bored you. You have made some good points.
Ciao, See me in Court, soon!