{"id":7789,"date":"2014-07-04T07:05:46","date_gmt":"2014-07-04T11:05:46","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7789"},"modified":"2014-07-04T07:05:46","modified_gmt":"2014-07-04T11:05:46","slug":"you-can-run-but-you-cant-hide","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/you-can-run-but-you-cant-hide\/","title":{"rendered":"You can run but you can&#8217;t hide"},"content":{"rendered":"<blockquote>\n<h1>The NSA Is Targeting Users of Privacy Services, Leaked Code Shows<\/h1>\n<p>If you use Tor or any of a number of other privacy services online or even visit their web sites to read about the services, there\u2019s a good chance your IP address has been collected and stored by the NSA, according to top-secret source code for a program the NSA uses to conduct internet surveillance.<\/p>\n<p>There\u2019s also a good chance you\u2019ve been tagged for simply reading news articles about these services published by Wired and other sites.<\/p>\n<p>This is according to code, obtained and analyzed by journalists and others in Germany, which for the first time reveals the extent of some of the wide-spread tracking the NSA conducts on people using or interested in using privatizing tools and services\u2014a list that includes journalists and their sources, human rights activists, political dissidents living under oppressive countries and many others who have various reasons for needing to shield their identity and their online activity.<\/p>\n<p>The source code, for the NSA system known as XKeyscore, is used in the collection and analysis of internet traffic, and reveals that simply searching the web for privacy tools online is enough to get the NSA to label you an \u201cextremist\u201d and target your IP address for inclusion in its database.<\/p><\/blockquote>\n<h4><em><span style=\"text-decoration: underline;\"><strong><a href=\"http:\/\/goo.gl\/K0G3Z7\" target=\"_blank\">Source: Wired. Read the rest of this article here.<\/a><\/strong><\/span><\/em><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The NSA Is Targeting Users of Privacy Services, Leaked Code Shows If you use Tor or any of a number of other privacy services online or even visit their web sites to read about the services, there\u2019s a good chance your IP address has been collected and stored by the NSA, according to top-secret source code for a\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/you-can-run-but-you-cant-hide\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,1426,1670,1656],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7789"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7789"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7789\/revisions"}],"predecessor-version":[{"id":7790,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7789\/revisions\/7790"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}