Popular Linux Website A Threat to the USA - Apparently
In what can only be described as the most funniest thing I've read in many many years, the U.S.A.'s National Security Agency (NSA) regards The Linux Journal Website as an extremists forum, and its users as extremists, therefore logs its users, likewise with privacy site TAILS, and they also keenly, but not really unexpectedly, (try to) target the Tor network.
I just find it ridiculous on all levels that Linux users, or anyone who values their privacy, are labelled as extremists, the only extremists here, are the out of control U.S.A's NSA!
It's wrong when merely visiting privacy related websites is enough for a user's IP address to be logged into a NSA database, and become a possible target, and it's beyond dangerous scope creep when visiting a Linux website gets you thrown into the same basket, it's about time these bastards had the reigns thrown on them, from not only within the U.S.A., but from all other countries that give a damn about their citizens, the only country with any guts at present to do this seems to be Germany. Shame on our Australian government as well, who wont do squat, since they are just U.S. puppets and lap dogs who take their orders from Washington.
The line "if you got nothing to hide, you have nothing to fear" is just pure bullshit and doesn't wash.
I just find it ridiculous on all levels that Linux users, or anyone who values their privacy, are labelled as extremists, the only extremists here, are the out of control U.S.A's NSA!

The line "if you got nothing to hide, you have nothing to fear" is just pure bullshit and doesn't wash.
From XKeyscore Rules
/ START_DEFINITION
/
These variables define terms and websites relating to the TAILs (The Amnesic
Incognito Live System) software program, a comsec mechanism advocated by
extremists on extremist forums.
/
$TAILS_terms=word('tails' or 'Amnesiac Incognito Live System') and word('linux'
or ' USB ' or ' CD ' or 'secure desktop' or ' IRC ' or 'truecrypt' or ' tor ');
$TAILS_websites=('tails.boum.org/') or ('linuxjournal.com/content/linux*');
// END_DEFINITION
TAILS
Tails is a privacy-focused Linux based operating system that runs entirely from an external storage device such as a USB stick or CD. It comes with Tor and other privacy tools pre-installed and configured, and each time it reboots it automatically wipes everything that is not saved on an encrypted persistent storage medium. However, pretty much any Linux distribution like Slackware, openSuSE, or Fedora, etc, are just as capable if you're slightly above a novice Linux user.
TOR
As for Tor (which incidentally was developed by the U.S. Navy Research Lab for protecting government communications), normally a user's online traffic - such as emails, instant messages, searches, or visits to websites, can be attributed to the IP address assigned to them by their internet service provider. When a user goes online over the Tor Network, their connections are relayed through a number of Tor nodes using another layer of encryption between each server such that the first server cannot see where the last server is located and vice-versa.
Please read the full five page story at http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
/ START_DEFINITION
/
These variables define terms and websites relating to the TAILs (The Amnesic
Incognito Live System) software program, a comsec mechanism advocated by
extremists on extremist forums.
/
$TAILS_terms=word('tails' or 'Amnesiac Incognito Live System') and word('linux'
or ' USB ' or ' CD ' or 'secure desktop' or ' IRC ' or 'truecrypt' or ' tor ');
$TAILS_websites=('tails.boum.org/') or ('linuxjournal.com/content/linux*');
// END_DEFINITION
TAILS
Tails is a privacy-focused Linux based operating system that runs entirely from an external storage device such as a USB stick or CD. It comes with Tor and other privacy tools pre-installed and configured, and each time it reboots it automatically wipes everything that is not saved on an encrypted persistent storage medium. However, pretty much any Linux distribution like Slackware, openSuSE, or Fedora, etc, are just as capable if you're slightly above a novice Linux user.
TOR
As for Tor (which incidentally was developed by the U.S. Navy Research Lab for protecting government communications), normally a user's online traffic - such as emails, instant messages, searches, or visits to websites, can be attributed to the IP address assigned to them by their internet service provider. When a user goes online over the Tor Network, their connections are relayed through a number of Tor nodes using another layer of encryption between each server such that the first server cannot see where the last server is located and vice-versa.
Please read the full five page story at http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
Comments
Display comments as Linear | Threaded