-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/03/2016 09:59 PM, Razer wrote:
The poster of that tweet, @thegrugq, 'security researcher', also said: "the government doesn’t use Tor."
https://twitter.com/attractr/status/783014723226861568
Comments?
"I was familiar with TOR and had it previously installed on a computer to anonymously monitor the social media website of militia groups operating within central Iraq." - Chelsea Manning, March 2013 So as of 2009 or so, U.S. Army intelligence was still using TOR for its originally stated purpose. I have not seen any indications that they have something better today; against its intended targets, TOR "just works." TOR has a daily user base of 1-3/4 to 2 million, a fair sized crowd to hide in. The likely alternative would be to impersonate a "normal" user via a fast VPN connection set up to spoof one's location and identity - and I am sure the intel services are all set up for that, where and as they have reasons to look perfectly normal vs. standing out as TOR users. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJX89s1AAoJEECU6c5XzmuqqhsH/RwOEpjq8YPBcVGZFmScsxFy gS/QzjHwwtskYUoLOnUSJsERF9LA/2Gn+9LUKjP/X96LzIfsv5IYtSTCCvVktL26 U6RlPSECntw/s8rV2h8I9ChitMsU4s3LANQrNy+aGv7A5J8A4X0z6RReEGdQS8+J vYEF2Ta94q56g0+aArijKg3wdCTsD8ABrRlH8qRsTbBsaAlMx58+MH4xZJtER5ed jyF8YOD/LJj/GZS/a9F03sVTerNuuHz2+JGf56j8Iuz800Q7lLzX6hX842fdoZmh IDPVA8rnQAjX7sUnodQK7/JtjxL7xHuSMzkHvPNVaFNtlMvWS682HmXjwTohG4g= =mI2e -----END PGP SIGNATURE-----