{"id":170362,"date":"2014-12-30T00:09:25","date_gmt":"2014-12-30T05:09:25","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/tor-truecrypt-tails-topped-the-nsas-most-wanted-in-2012-per-newly-revealed-snowden-leaks.php"},"modified":"2014-12-30T00:09:25","modified_gmt":"2014-12-30T05:09:25","slug":"tor-truecrypt-tails-topped-the-nsas-most-wanted-in-2012-per-newly-revealed-snowden-leaks","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/tor-truecrypt-tails-topped-the-nsas-most-wanted-in-2012-per-newly-revealed-snowden-leaks.php","title":{"rendered":"Tor, TrueCrypt, Tails topped the NSA&#39;s &#39;most wanted&#39; in 2012, per newly revealed Snowden leaks"},"content":{"rendered":"<p><p>    Three out of three? That    could be the score for the U.S. National Security Agencys    cryptographic most wanted list of 2012.  <\/p>\n<p>    In January 2012, it saw    Internet traffic anonymizing tool Tor (The Onion Router), Linux    distribution Tails (The Amnesic Incognito Live System) and disk    encryption system TrueCrypt as the biggest threats to its    ability to intercept Internet traffic and interpret other    information it acquires.  <\/p>\n<p>    Since then,     flaws have been found in Tor, and the FBI has    unmasked Tor users. A     vulnerability was found in Tails allowing attackers to    determine users IP addresses.  <\/p>\n<p>    Whilea source-code    audit gave     TrueCrypt a relatively clean bill of health in April,    TrueCrypts anonymous developersinexplicably    abandoned the software a few weeks later, warning it was    insecure.  <\/p>\n<p>    That the NSA considered these    tools dangerous is perhaps little surprise: In July it was    revealed that the agencys     XKeyScore traffic interception tool contains rules for    tracking who visited the websites of the Tor and Tails    projects.  <\/p>\n<p>    But now German magazine Der    Spiegel has published further documents from the     cache leaked by Edward Snowden, including one outlining, on    page 25, the tools the NSA    most wanted to crack in order to intercept and decrypt its    targets communications.  <\/p>\n<p>    The tools were ranked by    their impact, from trivial to catastrophic, and their use risk,    from current highest priority targets down to experimentation    by technical thought leaders.  <\/p>\n<p>    In the slide deck, the NSA    explained that, with rare exceptions, it only developed    application-specific solutions based on those two criteria,    impact and use risk. In a resource-constrained environment, it    said, the need for responses to current threats would always    trump speculative work on threats that might become more    widespread. Der Spiegel had something to say about those    constraints: Of the NSAs 2013 budget of over $10 billion, some    $34.3 million was allocated to Cryptanalysis and Exploitation    Services.  <\/p>\n<p>    Top of the NSAs list of    major or catastrophic threats, capable of causing a majority or    near-total loss or lack of insight into the highest-priority    targets communications or online presence, were Tor, Tails and    TrueCrypt.  <\/p>\n<p>    Of course, its unlikely that    the published attacks on Tor and Tails were developed by the    NSAbut with the Tor's unmasking attack costing researchers    just $3,000, the NSA could certainly have done something    similar with its budget over the last three years. Although    some of the wilder    conspiracy theories linking TrueCrypts demise to the NSA    have evaporated, there is still no convincing explanation for    why the developers abandoned a tool that had just come through    a code audit with no major flaws found.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.pcworld.com\/article\/2863972\/tor-truecrypt-tails-topped-the-nsas-most-wanted-list-in-2012.html\/RK=0\/RS=EA9OOmIjInFRraQgJMU3q6ZTKU8-\" title=\"Tor, TrueCrypt, Tails topped the NSA&#39;s &#39;most wanted&#39; in 2012, per newly revealed Snowden leaks\">Tor, TrueCrypt, Tails topped the NSA&#39;s &#39;most wanted&#39; in 2012, per newly revealed Snowden leaks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Three out of three? That could be the score for the U.S.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/tor-truecrypt-tails-topped-the-nsas-most-wanted-in-2012-per-newly-revealed-snowden-leaks.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-170362","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/170362"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=170362"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/170362\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=170362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=170362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=170362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}