Tor Taken down by Government-Sponsored Hackers Added: Friday, August 8th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
Hacker agencies hired by the US government managed to take down one of the last refuges of dissidents in oppressive regimes. The Tor system has long been recognized the only way that dissidents could communicate in repressive regimes. It is also known for being used by whistleblowers to leak their information. Now Tor is warning that many of its users could be identified by government-funded researchers.
According to Roger Dingledine, Tor Project leader, the service had identified machines on its network that had been altering the traffic of the system for 5 months, trying to unmask users connecting to the so-called “hidden services”. He also said it was likely the attacking machines were operated on behalf of the researchers at the Software Engineering Institute of Carnegie-Mellon University, funded by the Department of Defence of the United States. The machines have been removed from the network after they were discovered, but as you can understand, the damage has already been done. The researchers are going to speak on identifying Tor users at the Black Hat security conference in August. When Tor developers complained to the university, the local officials claimed the research had not been cleared and cancelled the talk.
Roger Dingledine admitted that people who operated or accessed hidden services from February through July might have been affected. As for those who navigated to ordinary websites, they should be good.
If you don’t know, hidden services include various underground drug websites like the shuttered Silk Road and privacy-conscious outfits like SecureDrop, especially designed to connect whistleblowers with media outlets. The Tor Project leader explained that the physical locations where the hidden services were housed could also have been exposed, but he was not sure about the content the visitors viewed.
But what really matters now is whether the spooks will just pop around to the researchers with a warrant and demand they hand over all the details they obtained during their experiments. As for the FBI, the agency didn’t comment on the questions about whether it would seek the information, while the Defence Department wasn’t quite sure if it even had the right to get research from the Institute.
Finally, Roger Dingledine recommended all Tor users to upgrade to the latest version of the software, because it addresses the vulnerability in question. He also warned that attempts to break Tor may continue.
Posted by: Date:
Friday, August 8th, 2014
|well I was checking out fake Rolex watches on silk road around that time so will beat all hard drives with a hammer and await the feds breaking down my door for perusing said items,p.s did not buy sh1te,so will leave door unlocked when at home to save them having to bust it in and replace it as having no front door after they open it with the big key is a pain in the derriere.|
|posted by (2014-08-08 23:35:18)|
|funny shit lol|
|posted by (2014-08-09 04:22:58)|
|what people should understand is that the only way to not get caught is to have your information travelling encrypted from source to destination. tor only made it difficult, never impossible.|
|posted by (2014-08-09 04:24:26)|
|oh, and using 128 bit aes!|
|@3 what methods are the best for encryption?? Never seen any software that does what you claim?|
|posted by (2014-08-10 02:08:23)|
|use a vpn|
|posted by (2014-08-10 16:22:25)|
|Never use internet. Connect with others via Telepathy!|
|@6- It came out last year in the 'first wave' of Snowden docs that the NSA cracks VPNs and subverts encryption by directly getting back doors put into it by agents in companies or the open source community that develop encryption protocols.|
All that stuff will not protect you as long as they can just print more money to subvert your security.
Historically 'secret police' cannot be reformed, and no matter how you resist, the only real solution is to put them in prison. No amount of encryption or 'reform' can make up for a lack of the criminals subverting security facing trial and serious senteces without pardons. Otherwise the next 'reformed' NSA will continue secretly subvert security. If we do nothing, they will do it in the open.
|Funny how when there is a Democrat president it's "Oh well nothing is secure", but when it is a Republican president it's all entirely his fault and must be impeached.|
|@6 lol at vpn @9 get a life|
|posted by (2014-08-12 00:54:22)|
|128 bit encryption needs a quantum computer to break - and they don't exist yet.|
not all vpns are the same. go ahead, capture my traffic, ya can't read it.
|posted by (2014-08-12 17:23:04)|
|they just cant take tor down in million years. just creating panic lol|
|posted by (2014-08-12 20:03:23)|
|256 bit encryption works, though they might come knocking, proxy chain||
Most Popular Stories