Difference between revisions of "VPN"

From Buggedplanet.info
Jump to navigationJump to search
 
(13 intermediate revisions by the same user not shown)
Line 4: Line 4:
 
|-
 
|-
 
|Date||Source||Title||Tags
 
|Date||Source||Title||Tags
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35537.pdf NSA Document: VoIP NSA alias]||[[NSA]] / [[VPN]] / [[VOIP]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35513.pdf NSA Document: TURMOIL/APEX/APEX High Level Describtion Document]||[[NSA]] / [[APEX]] / [[TURMOIL]] / [[FASHIONCLEFT]] / [[HAMMERMILL]] / [[HAMMERSTEIN]] / [[HAMMERCHANT]] / [[IPSEC]] / [[VPN]] / [[VOIP]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35516.pdf NSA Document: Analytic Challenges from Active-Passive Integration]||[[NSA]] / [[S324]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35519.pdf NSA Document: POISENNUT Virtual Private Network Attack Orchestrator (VAO)]||[[NSA]] / [[WEALTHYCLUSTER]] / [[POISENNUT]] / [[TURMOIL]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35520.pdf NSA Document: VPN SigDev Basics]||[[NSA]] / [[VPN]] / [[CRYPTANALYTICS]] / [[DISCOROUTE]] / [[TOYGRIPPE]] / [[MARINA]] / [[MASTERSHAKE]] / [[NKB]] / [[PINWALE]] / [[RENOIR]] / [[TREASUREMAP]] / [[TUNINGFORK]] / [[XKEYSCORE]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35521.pdf GCHQ Document: Profiling SSL and Attributing Private Networks]||[[GCHQ]] / [[FLYINGPIG]] / [[HUSH PUPPY]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35523.pdf NSA Document: Virtual Private Network Transform Engine Emulator (TEe)]||[[NSA]] / [[TEe]] / [[CRYPTANALYTICS]] / [[VPN]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35524.pdf NSA Document: POISENNUT Product]||[[NSA]] / [[POISENNUT]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35525.pdf NSA Document: TURMOIL GALLANTWAVE]||[[NSA]] / [[TURMOIL]] / [[GALLANTWAVE]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35526.pdf NSA Document: TURMOIL VPN PROCESSING]||[[NSA]] / [[TURMOIL]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35527.pdf NSA Document: VALIANTSURF Data Network Cipher (DNC) exploitation]||[[NSA]] / [[VALIANTSURF]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35514.pdf NSA Document: GALLANTWAVE@scale / GALANTWAVE @volume]||[[NSA]] / [[GALLANTWAVE]] / [[LONGHAUL]] / [[VPN]] / [[CRYPTANALYTICS]]
 
|-
 
|-
 
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35517.pdf NSA Document: VALIANTSURF (VS) Capabilities]||[[NSA]] / [[TURMOIL]] / [[VALIANTSURF]] / [[CRYPTANALYTICS]] / [[VPN]]
 
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35517.pdf NSA Document: VALIANTSURF (VS) Capabilities]||[[NSA]] / [[TURMOIL]] / [[VALIANTSURF]] / [[CRYPTANALYTICS]] / [[VPN]]
Line 15: Line 39:
 
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35529.pdf NSA Document: Fielded Capability: End-to-End VPN SPIN 9 Design Review]||[[NSA]] / [[TURBULENCE]] / [[TURMOIL]] / [[PRESSUREWAVE]] / [[TOYGRIPPE]] / [[KEYCARD]] / [[XKEYSCORE]] / [[TUBE]] / [[IPSEC]] / [[VPN]] / [[CRYPTANALYTICS]]
 
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35529.pdf NSA Document: Fielded Capability: End-to-End VPN SPIN 9 Design Review]||[[NSA]] / [[TURBULENCE]] / [[TURMOIL]] / [[PRESSUREWAVE]] / [[TOYGRIPPE]] / [[KEYCARD]] / [[XKEYSCORE]] / [[TUBE]] / [[IPSEC]] / [[VPN]] / [[CRYPTANALYTICS]]
 
|-
 
|-
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35515.pdf NSA Document: Intro to the VPN Exploitation Process]||[[NSA]] / [[PINWALE]] / [[TOYGRIPPE]] / [[XKEYSCORE]] / [[FOURSCORE]] / [[VULCANDEATHGRIP]] / [[IPSEC]] / [[PPTP]] / [[SSL/TLS]] / [[VPN]] / [[SSH]] / [[CRYPTANALYTICS]]
+
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35515.pdf NSA Document: Intro to the VPN Exploitation Process]||[[NSA]] / [[PINWALE]] / [[TOYGRIPPE]] / [[XKEYSCORE]] / [[FOURSCORE]] / [[VULCANDEATHGRIP]] / [[IPSEC]] / [[PPTP]] / [[SSL/TLS]] / [[VPN]] / [[SSH]] / [[CRYPTANALYTICS]] / [[S31176]]
 
|-
 
|-
 
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35540.pdf NSA Document: Internet Anonymity 2011]||[[NSA]] / [[CRYPTANALYTICS]] / [[TOR]] / [[VPN]]
 
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35540.pdf NSA Document: Internet Anonymity 2011]||[[NSA]] / [[CRYPTANALYTICS]] / [[TOR]] / [[VPN]]

Latest revision as of 22:00, 1 January 2015

Articles

Date Source Title Tags
20141228 spiegel.de NSA Document: VoIP NSA alias NSA / VPN / VOIP / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL/APEX/APEX High Level Describtion Document NSA / APEX / TURMOIL / FASHIONCLEFT / HAMMERMILL / HAMMERSTEIN / HAMMERCHANT / IPSEC / VPN / VOIP / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Analytic Challenges from Active-Passive Integration NSA / S324 / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: POISENNUT Virtual Private Network Attack Orchestrator (VAO) NSA / WEALTHYCLUSTER / POISENNUT / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VPN SigDev Basics NSA / VPN / CRYPTANALYTICS / DISCOROUTE / TOYGRIPPE / MARINA / MASTERSHAKE / NKB / PINWALE / RENOIR / TREASUREMAP / TUNINGFORK / XKEYSCORE
20141228 spiegel.de GCHQ Document: Profiling SSL and Attributing Private Networks GCHQ / FLYINGPIG / HUSH PUPPY / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Virtual Private Network Transform Engine Emulator (TEe) NSA / TEe / CRYPTANALYTICS / VPN
20141228 spiegel.de NSA Document: POISENNUT Product NSA / POISENNUT / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL GALLANTWAVE NSA / TURMOIL / GALLANTWAVE / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL VPN PROCESSING NSA / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VALIANTSURF Data Network Cipher (DNC) exploitation NSA / VALIANTSURF / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: GALLANTWAVE@scale / GALANTWAVE @volume NSA / GALLANTWAVE / LONGHAUL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VALIANTSURF (VS) Capabilities NSA / TURMOIL / VALIANTSURF / CRYPTANALYTICS / VPN
20141228 spiegel.de NSA Document: VS MALIBU IKE and ESP Metadata Flows NSA / MALIBU / TURMOIL / VALIANTSURF / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SPIN 15 VPN Story NSA / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL IPSEC VPN Sessionization NSA / TURMOIL / IPSEC / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Fielded Capability: End-to-End VPN SPIN 9 Design Review NSA / TURBULENCE / TURMOIL / PRESSUREWAVE / TOYGRIPPE / KEYCARD / XKEYSCORE / TUBE / IPSEC / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Intro to the VPN Exploitation Process NSA / PINWALE / TOYGRIPPE / XKEYSCORE / FOURSCORE / VULCANDEATHGRIP / IPSEC / PPTP / SSL/TLS / VPN / SSH / CRYPTANALYTICS / S31176
201401228 spiegel.de NSA Document: Internet Anonymity 2011 NSA / CRYPTANALYTICS / TOR / VPN