Author Topic: US Investigates TOR, compromised?  (Read 1203 times)

0 Members and 1 Guest are viewing this topic.

Offline Getherer

  • Peasant
  • *
  • Posts: 52
  • Cookies: 4
    • View Profile
US Investigates TOR, compromised?
« on: August 05, 2013, 03:23:30 pm »
Hey guys,

I was reading news on one of my native websites, which I consider to be sharing true information.

I came along to one of the news which says that US government aims now for TOR, as they said the first priority is to take down pornographic websites with CP.
Of course that is only what they say and... I can already feel it in my bones how they will target other services like silk road and such.

I tried to find something about it on any of the English websites, but with no luck yet, so don't know whether it is a real deal. I would imagine so though.

Here's a link to some blog:

http://www.twitlonger.com/show/n_1rlo0uu

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: US Investigates TOR, compromised?
« Reply #1 on: August 05, 2013, 03:51:03 pm »
This will never end.
Im gonna post all my personal information on some website, at least then im a head of time 10 years and ill be calling you all old fashioned with all that privacy bullshit.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline Axon

  • VIP
  • King
  • *
  • Posts: 2047
  • Cookies: 319
    • View Profile
Re: US Investigates TOR, compromised?
« Reply #2 on: August 05, 2013, 06:21:11 pm »
Well fellows, we are fucked.

Offline Mordred

  • Knight
  • **
  • Posts: 360
  • Cookies: 135
  • Nvllivs in Verba
    • View Profile
Re: US Investigates TOR, compromised?
« Reply #3 on: August 06, 2013, 01:20:38 am »
TOR was initially exploited back in 2011 by a team of french researchers. I think they got access to like 600 (6000 maybe?) nodes and could read all messages going back and forth through those nodes.

Also you might want to check out the article posted on ZDnet yesterday. As a teaser:
Quote
Summary: As the FBI seeks the extradition of a man believed to be hosting child abuse material, Tor network sites owned by the accused have been subject to an exploit, leading many to believe that the agency has been infiltrating it for some time.

Link to the article.


L.E.: Found the article about the French researchers. It was 6000 machines that they inventoried on the network, not 600/6000 nodes per-se. Link to the article.
« Last Edit: August 06, 2013, 01:22:47 am by Mordred »
\x57\x68\x79\x20\x64\x69\x64\x20\x79\x6f\x75\x20\x65\x76\x65\x6e\x20\x66\x75\x63\x6b\x69\x6e\x67\x20\x73\x70\x65\x6e\x64\x20\x74\x68\x65\x20\x74\x69\x6d\x65\x20\x74\x6f\x20\x64\x65\x63\x6f\x64\x65\x20\x74\x68\x69\x73\x20\x6e\x69\x67\x67\x72\x3f\x20\x44\x61\x66\x75\x71\x20\x69\x73\x20\x77\x72\x6f\x6e\x67\x20\x77\x69\x74\x68\x20\x79\x6f\x75\x2e

Offline vezzy

  • Royal Highness
  • ****
  • Posts: 771
  • Cookies: 172
    • View Profile
Re: US Investigates TOR, compromised?
« Reply #4 on: August 06, 2013, 02:06:08 am »
The security of Tor becomes compromised if one has control over the exit nodes. It's safe to assume the government does, plus Tor was originally DARPA technology, so it's unwise to rely too much on it.
Quote from: Dippy hippy
Just brushing though. I will be semi active mainly came to find a HQ botnet, like THOR or just any p2p botnet

Offline Feyd

  • /dev/null
  • *
  • Posts: 18
  • Cookies: -1
  • The spice must flow
    • View Profile
Re: US Investigates TOR, compromised?
« Reply #5 on: August 07, 2013, 12:20:53 am »
The security of Tor becomes compromised if one has control over the exit nodes. It's safe to assume the government does, plus Tor was originally DARPA technology, so it's unwise to rely too much on it.
That depends on what you mean with security.
The exit nodes can of course read the exact data that is sent by the Tor user and where this data is going to. However, the exit node can not see where the data came from so the user is still anonymous (given that not ALL of the relays between the user and the exit nodes are not compromised by the same entity as the exit node).