ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Allied 2016 HDCAM x264 AC3 HQMic-CPG
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
Hot torrents
View Torrent Info: SiREN.2016.DVDRip.XViD-ETRG
View Torrent Info: Evans.Crime.2015.HDRip.XViD-ETRG
View Torrent Info: 31.2016.BRRip.XViD.AC3-ETRG
View Torrent Info: A Girl Like Grace.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Mechanic.Resurrection.2016.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: The.Mechanic.2011.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: Ordinary.World.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Miss.Peregrines.Home.for.Peculiar.Children.2016.720p.BRRip.x264.AAC-ETRG
Hot torrents
View Torrent Info: Arrow.S05E09.HDTV.x264-LOL[ettv]
View Torrent Info: Vikings.S04E12.HDTV.x264-KILLERS[ettv]
View Torrent Info: Survivor.S33E13.HDTV.x264-CROOKS[ettv]
View Torrent Info: Designated.Survivor.S01E09.HDTV.x264-KILLERS[ettv]
View Torrent Info: Madaari (2016) HQ 1080p Blu-Ray x264 DTSHD-MA 5.1 ESub -DDR
View Torrent Info: AE DIL HAI MUSHKIL (2016) DVDRIP 1CDRIP x264 AAC ESub [DDR]
View Torrent Info: Train.To.Busan.2016.720p.WEBRip.x264.Korean.AAC-ETRG
View Torrent Info: YZ.2016.Marathi.1080p.WEB-DL.H264.ESub.AAC2.0-DDR
To add new messages please Login or Register for FREE
Warning! Use a VPN When Downloading Torrents!
Your IP Address is   Location is United States
Your Internet Provider and Government can track your torrent activity!  Hide your IP ADDRESS with a VPN!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Tor Developers Worry about Flaws in the System

Tor Developers Worry about Flaws in the System

Tor Developers Worry about Flaws in the System

Added: Tuesday, November 25th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The Tor project is currently working on the anonymous browser, but the developers have expressed concern over an intergovernmental operation, which has recently taken down 27 hosts offering “hidden services” or websites that were only accessible via the Tor network.

That intergovernmental operation, which is actually collaboration between American and European authorities, is dubbed “Onymous” and led to the seizure of over 400 hidden services. Nevertheless, the authorities wouldn’t reveal how they found out the location of the hidden services. The problem is that Tor’s design is meant to prevent these locations from being revealed.

According to the Tor project, in liberal democracies, they should expect that when some of the 17 suspects are prosecuted, the authorities would have to explain to the court how they came to be suspects. Thus, Tor could learn if there are security vulnerabilities in hidden services or other critical online-facing services. The developers admit they are most interested in understanding how those services were located, and whether this indicates a security flaw in Tor hidden services. They are concerned about the possibility of those flaws to be exploited by criminals or secret police repressing dissents.

It is known that the list of websites shut down in the operation included Silk Road 2.0, a successor to the original online black marketplace, Silk Road. This was where both legal and illegal goods and services were sold and bought using the Bitcoin. The operation resulted in the arrest of a total of 17 suspects, with Blake Benthall being accused of operating Silk Road 2.0.

In the meantime, the authorities suggest they found Benthall via a rookie error, claiming that the developer registered the server for the website at his personal email address. Nevertheless, Tor warned that the American DEA and other agencies have built a system of organized and sanctioned perjury, which entails reporting not how they located a particular individual, but merely how they could have done so.

The developers of the anonymous network suggest that such “operational security” errors may have led to website operators being uncovered, but they also address other potential flaws. They believe that an SQL injection attack or other exploitation of a common web bug could have been used, as well as an attack through the Bitcoin network.

However, the Tor developers most worry about the possibility that the hidden services were revealed due to the weakness in the protocol itself. They say that both the number of takedowns and the fact that Tor relays were seized could mean that their network was attacked in order to find out the location of those hidden services. Apparently, the developers have got some interesting data from one of the operators of a now-seized hidden service, which may also prove this.

Posted by:  SuperAdmin
Date:  Tuesday, November 25th, 2014

Comments (4) (please add your comment »)

posted by (2014-11-25 12:29:03)
Rockman avatarLets hope they can block umn TOR

posted by Kitty (2014-11-26 03:43:40)
redbull99 avatarthere is clearly flaws as they have been shutting down all the proper websites nearly every other day now and are arresting the so called founders so yeah there clearly is flaws.

posted by (2014-11-26 10:14:20)
No avatarRockman how bad you are for wanting them to block tor, strange thing is the us government contributed to the funding for the tor project and even distributed it to foreign countries only then to break it.

posted by (2014-11-26 20:43:06)
cggc avatartor I would consider it a trick to not knowing the location of the browser and thus not be penalized in any way for grabbing files that might someday be charged as well as the old napster website and if the quality of files that some movies if are quite a lot of bad to see and hear. besides all, companies have the best detector to locate you and is uncomfortable for anyone who is not of public and wants to have a little privacy when browser on the line but to finish also is the world if it is to think that some terrorist listen torrent files or watch tor holding that serious evil for the defense intelligence community that must be to do what they do not talking about copyright according everyday is infringed upon on the line.

Articles Search
Most Popular Stories
Articles Categories
Articles Tags

Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc3