The problem with surveillance software is that there’s probably a whole lot out there that we just don’t know about, either because it’s a proprietary application for a private firm or government agency. I’m sure we have all heard about the recent FBI vs Apple debacle in which the FBI demanded that Apple build an app to crack iPhone encryption, so that they could access the phone data of a San Bernardino shooter. Had Apple complied with the FBI’s demands, this would have set an important precedence and could have potentially rendered many encryption algorithms potentially useless. Although Apple stuck to their guns and refused to assist, the FBI suddenly found their way in to the iPhone with the help of an Israeli firm called Cellebrite.
All of this business with the iPhone cracking has got me thinking again about security, hacking and surveillance software. By no means can I even begin to scratch the surface of what’s out there, but I do want to examine a few important pieces of software that could impact all TOR users. But before we look at TOR surveillance and all of that fancy stuff, let’s take a look at what has gone on