Filtered By
QUICK ANTX
Codewords [filter]
Results
3 Total
1.0

Tor: Overview of Existing Techniques

Document

Document Date: 2012-01-01Release Date: 2014-12-28
This undated GCHQ presentation indicates the agency’s Tor research efforts as of 2012: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 Tor: Overview of Existing Techniques (15 minutes) TOP SECRET STRAP 1 C! X R «two THIS INCDRHftTION IS EXEMPT UNDER THE FREEDOM QC I hJTOR M ATIG R FTF n -SV “Q A ...
1.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
1.0

Tor Stinks

Document

Document Date: 2012-06-01Release Date: 2013-10-04
A presentation entitled ‘Tor Stinks’ outlines the capabilities and difficulties of attacking the Tor anonymity network: see the Guardian article NSA and GCHQ target Tor network that protects anonymity of web users, 4 October 2013.
TOP SECRET//COMINT// REL FVEY Stinks JUN 2012 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20370101 TOP SECRET//COMINT// REL FVEY TOP SECRET//COMINT// REL FVEY To...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh