Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Monday November 10 2014, @06:14PM   Printer-friendly
from the your-help-is-needed dept.

Little is known about how U.S. and European law enforcement shut down more than 400 websites, including Silk Road 2.0, which used technology that hides their true IP addresses. The websites were set up using a special feature of the Tor network, which is designed to mask people’s Internet use using special software that routes encrypted browsing traffic through a network of worldwide servers.

The Tor Project, is a nonprofit that relies in part on donations. The project “currently doesn’t have funding for improving the security of hidden services,” wrote Andrew Lewman, the project’s executive director, in a blog post on Sunday. ( https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous )

It is possible that a remote-code execution vulnerability has been found in Tor’s software, or that the individual sites had flaws such as SQL injection vulnerabilities. But Lewman wrote The Tor Project had little information on the methods used by law enforcement in the latest action.

“Tor is most interested in understanding how these services were located and if this indicates a security weakness in Tor hidden services that could be exploited by criminals or secret police repressing dissents,” he wrote.

http://www.pcworld.com/article/2845352/tor-project-mulls-how-feds-took-down-hidden-websites.html

[Related]: https://blog.torproject.org/blog/hidden-services-need-some-love

Can anybody help Andrew Lewman understand what happened ?

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by jasassin on Monday November 10 2014, @09:09PM

    by jasassin (3566) <jasassin@gmail.com> on Monday November 10 2014, @09:09PM (#114627) Journal

    GET /.nsa-phone-home.php?host=home.nsa.gov HTTP/1.1
    Host: www.silkroad2-point-oh.com
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1 NSA Edition)

    I have no idea what the hell you are talking about. How does that give the IP address of a hidden service? Sure if the feds post a link and you click on a link, it might give your IP address, but how does it give Silk Road 2.0's IP address?

    --
    jasassin@gmail.com Key fingerprint = 0644 173D 8EED AB73 C2A6 B363 8A70 579B B6A7 02CA
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 3, Interesting) by DECbot on Monday November 10 2014, @09:27PM

    by DECbot (832) on Monday November 10 2014, @09:27PM (#114634) Journal

    The joke is that apache, IIS, etc are universally compromised. GET the super secret php file with the right user agent string and the server spits out its IP address, bypassing the anonymization of Tor. The question is, is it easier for the NSA to capture enough exit nodes to map the tor network, or to ddos the tor network, or to compromise the guys responsible for compiling the binaries for the distros, Microsoft, and tor?

    --
    cats~$ sudo chown -R us /home/base