IRC Botnet Takes Advantage of Tor NetworksAdded: Tuesday, December 18th, 2012
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extratorrent.com
One of the German anti-virus firms, G Data Software, has found out a controlled from an IRC server botnet inside Tor’s networks. According to the security experts from G Data Software, the botnet is operated via an Internet Relay Chat server hidden inside Tor’s networks.
The security specialists point out that this method involves both benefits and drawbacks. However, the specified list of benefits seems to over weigh the disadvantages. First of all, the obvious advantage is that the botnet server can’t be closed down, because it is nearly impossible to pin-point its location. Secondly, Tor’s protocol also includes encrypted data running via several nodes, which makes surveillance on a certain network very difficult. Finally, there’s also the fact that Tor blocks the traffic originating from these infected computers; this means that the botnet’s efficiency is improved.
Despite the fact that Tor Project was originally created for legitimate use, there are certain cases in which users involved in illegal activities can benefit on their services. And the situation described above is not the first case: in fact, Tor has even been used to sell illegal drugs on the Internet in the past.
As for disadvantages of using this method, G Data’s specialists note that malware like this suffers from the latencies coming with the Tor network. This means that Tor is quite slow and unreliable, and these disadvantages are inherited to underlying botnets. Anyway, the operators of the botnet seem to be unaware of the drawbacks and keep running it from Tor’s networks without any problems.
December 18th,2012Posted by:
Tuesday, December 18th, 2012
|IRC internoding of data does not make tracking difficult it makes it impossible to track since when passing data between nodes from one to another the node closes after transfer to the next node thereby leaving no chance of tracking it,this was the security premise of Ants p2p one of the earliest torrent programs developed by an Italian engineer of my acquaintance some years ago around 2005 and although the program was painfully slow compared to others the security concept was and is sound.|
|Same old diarrhea,that which is light and wet and fly's in the wind through a picket fence and make's the freckle less suddenly have freckles.|
|@firefoxsniper lmao are we talking Haiku here or irc internoding either way a little beyond your mortal ken |
There is a point at which BS does not baffle brains,let him who hath understanding reckon the number of the beast for it is a human number 6667 lmao.
|Azureus has a few who claim that it has bloated by such additions in media player,internal search engine etc,but the point to them is that when eventually the Man makes torrent sites go underground and mobile all the previous separate programs such as vlc and search engine etc are contained within one secure program and as there is now reported over 10 million downloads through mobile torrents you may see why,if you do not then it`s simple smarter people than yourself have known that doing static torrents from a home pc would ultimately be the end users downfall so planning ahead for the day when all torrents on a mobile platform with enhanced security was required.|
|We think to think about something,we think about it,then we know we thought about it,the three steps in human thought.And so we move on, roll over, fart, and go back to sleep?|
|E = mc2 squared,but I tend to like things more round,like a tasty lemon pie,or the mouth off to left of my # 6 posting.|
|And # 7 so on and so forth.|
|hypnotizing isn't she.|
|posted by (2012-12-19 14:36:32)|
|WoW! You were there?! So many. iRC Metro even had 10K people on a Saturday.|
The Platform makes for a good game this time round. Peace.
|prefer her with dark hair and less tattoos,lol.|
|so then is it true that they can't track and harass you for downloading and seeding using vuse for downloads? or this tor for whatever reason?|
|Azureus has all required applications built in since extraneous applications give ISP tells as to what you are and have been doing some less enlightened people say that by the addition of integrated search,media player,transcoder,disc burner and blocklist etc it is bloated I say and have for many years that it is the tells from external programs that give you away to your ISP and others and so much more secure to have them inbuilt into the one program wrapped up in Java,you must always keep within parity thresholds as well since despite the applications security you can still give yourself away i.e by uploading large amounts of data so better to keep such to tolerable limits of your upstream connection this is explained in vuze documentation and you can test your connectivity in the application and ISP speeds etc overall Azureus offers the safest most configurable program amongst Bit torrent applications in my humble opinion.|
|#7 energy = mass x the speed of light squared not E=MC2 squared since the 2 represents squared in the equation already,its all relative as Einstein would say.|
|thx embolism much appreciated|
|NP friend vuze plus has the best functionality since the free version dips out on certain things but for standard client the free version works just as well 22.214.171.124 B2 is the most current version,if you wish to transcode,burn to disc,do torrent searches for films,etc or bandwidth manager etc then vuze plus is for you,the latest version sorts out socks issues and gives VPN dedication any questions refer to Vuze forum and vuze wiki,have fun .|
|vuze+ also allows you to do streaming direct to other platforms like tv,psp,xbox etc a bonus since Bit torrent are still in the baby steps to live streaming its worth a few bucks for the benefits you receive although since testing the application @sourceforge.net from around 2004 I have just used the regular client,the plugins are worth checking out and always recommend that you put ip blocklist into the safepeer interface (IP filter) before using the program.Bon chance.|
|If you have already downloaded version 4.8.1 and have it configured you can just add cvs plug in to update so no need to uninstall/ reinstall,one of many useful plug ins|
|posted by (2012-12-22 10:17:19)|
|good man go hed|
|posted by (2012-12-23 05:53:22)|
|not a fan of tor tryed it and it's slow as hell|
Most Popular Stories