http://dds6qkxpeiqvogt4y2fd7vtsxq6pvokekb2h4la7jd4iwl4ljuawu5qd.onion/wiki/Dev/Technical_Introduction
Encryption, Tor / Tor Browser, other anonymity tools, "secure" hardware configurations and so on are helpless against these attacks, which are increasingly automated and being scaled up in size. For example, the American IC prefers using the TURBINE system for this purpose. The following is just a small sample of the hundreds of advanced implants and tools currently in use.