Tor Developers Worry about Flaws in the SystemAdded: Tuesday, November 25th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The Tor project is currently working on the anonymous browser, but the developers have expressed concern over an intergovernmental operation, which has recently taken down 27 hosts offering “hidden services” or websites that were only accessible via the Tor network.
That intergovernmental operation, which is actually collaboration between American and European authorities, is dubbed “Onymous” and led to the seizure of over 400 hidden services. Nevertheless, the authorities wouldn’t reveal how they found out the location of the hidden services. The problem is that Tor’s design is meant to prevent these locations from being revealed.
According to the Tor project, in liberal democracies, they should expect that when some of the 17 suspects are prosecuted, the authorities would have to explain to the court how they came to be suspects. Thus, Tor could learn if there are security vulnerabilities in hidden services or other critical online-facing services. The developers admit they are most interested in understanding how those services were located, and whether this indicates a security flaw in Tor hidden services. They are concerned about the possibility of those flaws to be exploited by criminals or secret police repressing dissents.
It is known that the list of websites shut down in the operation included Silk Road 2.0, a successor to the original online black marketplace, Silk Road. This was where both legal and illegal goods and services were sold and bought using the Bitcoin. The operation resulted in the arrest of a total of 17 suspects, with Blake Benthall being accused of operating Silk Road 2.0.
In the meantime, the authorities suggest they found Benthall via a rookie error, claiming that the developer registered the server for the website at his personal email address. Nevertheless, Tor warned that the American DEA and other agencies have built a system of organized and sanctioned perjury, which entails reporting not how they located a particular individual, but merely how they could have done so.
The developers of the anonymous network suggest that such “operational security” errors may have led to website operators being uncovered, but they also address other potential flaws. They believe that an SQL injection attack or other exploitation of a common web bug could have been used, as well as an attack through the Bitcoin network.
However, the Tor developers most worry about the possibility that the hidden services were revealed due to the weakness in the protocol itself. They say that both the number of takedowns and the fact that Tor relays were seized could mean that their network was attacked in order to find out the location of those hidden services. Apparently, the developers have got some interesting data from one of the operators of a now-seized hidden service, which may also prove this.
Posted by: Date:
Tuesday, November 25th, 2014
|posted by (2014-11-25 12:29:03)|
|Lets hope they can block umn TOR|
|there is clearly flaws as they have been shutting down all the proper websites nearly every other day now and are arresting the so called founders so yeah there clearly is flaws.|
|posted by (2014-11-26 10:14:20)|
|Rockman how bad you are for wanting them to block tor, strange thing is the us government contributed to the funding for the tor project and even distributed it to foreign countries only then to break it.|
|posted by (2014-11-26 20:43:06)|
|tor I would consider it a trick to not knowing the location of the browser and thus not be penalized in any way for grabbing files that might someday be charged as well as the old napster website and if the quality of files that some movies if are quite a lot of bad to see and hear. besides all, companies have the best detector to locate you and is uncomfortable for anyone who is not of public and wants to have a little privacy when browser on the line but to finish also is the world if it is to think that some terrorist listen torrent files or watch tor holding that serious evil for the defense intelligence community that must be to do what they do not talking about copyright according everyday is infringed upon on the line.||
Most Popular Stories