For years its been known that shortly after the 2004 Olympic games in Athens a wiretapping operation against the Greek parliament was busted. There was no public information on who was behind it. Thanks to a recently published article based on the Snowden disclosures, the loose ends are finally tied.
Interesting points that jumped out from the story:
* Most of the international information accesses are under the guise of information sharing with “allies” or “friends”. A state somewhere hopes to benefit from the NSA’s equipment to spy on their own people and political targets in return for sharing data. They believe these agreements exempt their own government from being a target but they don’t realize the NSA has no friends, only targets – easy and hard ones.
* They invoked the terrorist meme to convince client states to cooperate. Nothing new here except one would think politicians would be a little smarter and see through this because they use it on people all the time. Apparently not.
* There is some serious rivalry between US Intelligence Agencies. Each acts as it’s own independent fiefdom competing for influence and funding. The NSA considers themselves on the apex of information gathering unaccountable to no one, not even their CIA partners.
* Global Telecom Corporations are a great umbrella for espionage activities. Even when it was clear what’s going on, they covered up for them.
* If you are a custodian for a network they want to access, they will crack you or whack you and make it look like an accident.
* Lawful Intercept backdoors in communications is a massive hole that let’s everyone in indiscriminately. It doesn’t matter if we call it a golden key or platinum trapdoor.
* This is the first time an “allied” state issues an arrest warrant for an American intelligence operative, bucking the trend of their cuckolded European neighbors.
Anonymous blogging and journalism is becoming ever complicated in the age of mass surveillance and data mining. I want to draw the attention of our publishing users to the fact that every photo and video shot with a camera carries its sensor’s unique fingerprint and unlike regular digital file metadata, there is no practical software to clean up this type of identifier. This links the data you share back to you or your source even, if you publish them from behind Tor.
Its not an unsurmountable problem. Provided you religiously follow the updated operational security guidelines posted on the wiki, you should be able to safely share your facts with the world.
Stay safe. Stay free.
Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP.
Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.
Whonix for Qubes
Whonix for KVM
Whonix for VirtualBox
If you want to upgrade existing Whonix version using Whonix’s APT repository
Special instructions required:
Edit 1: There will be no more support for upgrading Whonix 10 to Whonix 11 after October 17 2015.
If you want to upgrade existing Whonix version from source code
If you want to build images from source code
Call for Help
– Contribute: https://www.whonix.org/wiki/Contribute
– Donate: https://www.whonix.org/wiki/Donate
Changelog between Whonix 10 and Whonix 11
See following two blog posts that were calls for testing, these contain the changelogs. Whonix 126.96.36.199.0 has been blessed stable and released as Whonix 11.
You are advices to set configure the following setting in Tor Browser in Whonix:
Edit -> Preferences -> Applications ->Portable Document Format (PDF) -> Save File
You are advices to update as soon as updates are available. This blog post will be updated as new information come in.
(Do that same with Firefox / Iceweasel if you are using that elsewhere.)
Problem description at Mozilla Firefox blog:
Impact in Whonix:
– Unless you were using AppArmor, local files within the VM would be accessible.
– Tor Browser
Tor Browser upstream Bug report:
Whonix forum discussion:
The Whonix download page was recently updated to reflect the supported platforms that have been available for some time.
Please check it out: