{"id":219933,"date":"2017-06-16T03:06:05","date_gmt":"2017-06-16T07:06:05","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/the-internet-browser-nsa-doesnt-want-you-to-use-off-the.php"},"modified":"2017-06-16T03:06:05","modified_gmt":"2017-06-16T07:06:05","slug":"the-internet-browser-nsa-doesnt-want-you-to-use-off-the","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/the-internet-browser-nsa-doesnt-want-you-to-use-off-the.php","title":{"rendered":"The Internet Browser NSA Doesnt Want You To Use | Off The &#8230;"},"content":{"rendered":"<p><p>    Theres a free method of searching the    Internet thats so anonymous and secure the National Security Agency wants to destroy    it. Its called TOR or the Onion Router, and documents obtained by    The Guardian indicate that both the NSA and its British partner GCHQ have been    unable to crack TOR.  <\/p>\n<p>    An NSA analyst described TOR as the king of high-secure, low    latency internet anonymity.  <\/p>\n<p>    So what is TOR and how can you use it? Basically, TOR is a    network that bounces your searches and communications all over    the Internet via several different computers making them hard    to track. You access TOR using a special browser or an app.  <\/p>\n<p>    The NSA has had such a hard time trying to crack TOR that it    actually created a top secret presentation called TOR    Stinks. TOR Stinks was among the documents leaked    by Edward Snowden to the Guardian. Its author wrote: We will    never be able to de-anonymyze all TOR users all the time. That    means the NSA will never be able to identify all TOR users.  <\/p>\n<p>    How TOR works  <\/p>\n<p>    The most interesting thing about TOR is that it was developed by the US    government, specifically the State Department and the Defense    Department. The idea was to create a secret and secure means of    communication for spies and dissidents.  <\/p>\n<p>    John Eidsmoe rights the faulty    historical record and brings us back to the roots that made    America great . . .  <\/p>\n<p>    TOR works by creating an encrypted packet of Internet traffic    that is bounced through a number of nodes or servers. TOR users    use a special Firefox web browser that sends all of the traffic    through the TOR network. This is hard to track because it isnt    moving through normal channels.  <\/p>\n<p>    A TOR user in Nebraska might have her Internet traffic routed    through a node in Manitoba and another Node in Great Britain    which would confuse a person trying to locate her. It isnt    perfect but its a pretty good way of covering your tracks    online.  <\/p>\n<p>    A good way to think of TOR is as another secret Internet inside    the Internet. Its currently used by spies, dissidents,    journalists and special operations soldiers such as those in    Delta Force. These are called Darknets and theyre often used    by criminals as well as the government.  <\/p>\n<p>    The NSA has made a number of efforts to crack TOR. Its tried    to insert malicious code into TORs browser bundle. The NSA had been    using a hole in Firefox to infiltrate TOR but thats recently    been plugged.  <\/p>\n<p>    How to use TOR  <\/p>\n<p>    Using TOR is easy; just visit the TOR website.    The site has several downloadable tools that can help protect    your anonymity online. These include:  <\/p>\n<p>    The TOR website is a great resource that provides connections    to a wide variety of excellent tools for thwarting surveillance    efforts. If youre serious about anonymity online, it is the    place to begin.  <\/p>\n<p>    It appears there is an effective and low-cost method that    enables the average person to avoid most surveillance. That    method was created with our tax dollars, and another government    agency is using our tax dollars in an attempt to destroy it. It    is possible for average people to frustrate the NSA with TOR.  <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.offthegridnews.com\/privacy\/the-internet-browser-nsa-doesnt-want-you-to-use\/\" title=\"The Internet Browser NSA Doesnt Want You To Use | Off The ...\">The Internet Browser NSA Doesnt Want You To Use | Off The ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Theres a free method of searching the Internet thats so anonymous and secure the National Security Agency wants to destroy it. Its called TOR or the Onion Router, and documents obtained by The Guardian indicate that both the NSA and its British partner GCHQ have been unable to crack TOR. An NSA analyst described TOR as the king of high-secure, low latency internet anonymity.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/the-internet-browser-nsa-doesnt-want-you-to-use-off-the.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-219933","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/219933"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=219933"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/219933\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=219933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=219933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=219933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}