Posts Tagged tor

Possible Flaw in TOR Network

The Tor network, which allows for anonymous browsing on the internet, may have been cracked by researchers.

From Gizmodo:

Tor believes this attack came from researchers at Carnegie Mellon’s Computer Emergency Response Team, not an identity thief (or, uh, the government). CERT researchers abruptly canceled a highly anticipated talk they were going to give about the possibility of deanonymizing Tor at the Black Hat conference this year, kicking off speculation that they’d successfully pulled it off.

From Ars Technica:

The campaign exploited a previously unknown vulnerability in the Tor protocol to carry out two classes of attack that together may have been enough to uncloak people using Tor Hidden Services, an advisory published Wednesday warned. Tor officials said the characteristics of the attack resembled those discussed by a team of Carnegie Mellon University researchers who recentlycanceled a presentation at next week’s Black Hat security conference on a low-cost way to deanonymize Tor users. But the officials also speculated that an intelligence agency from a global adversary might have been able to capitalize on the exploit.

, , ,

No Comments

NSA Targeted TOR Network With Malware


Initial investigations traced the address to defense contractor SAIC, which provides a wide range of information technology and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) support to the Department of Defense. The geolocation of the IP address corresponds to an SAIC facility in Arlington, Virginia.

, , , , , , ,

No Comments

Keeping The NSA Out of Your Life

The Washington Post has a list of some things you can do to increase your security and make it harder for the government to keep tabs on you.

If recentreports are to be believed, the National Security Agency has broad powers to capture private information about Americans. They know who we’re calling, they have access to our Gmail messages and AOL Instant Messenger chats, and it’s a safe bet that they have other interception capabilities that haven’t been publicly disclosed. Indeed, most mainstream communications technologies are vulnerable to government eavesdropping.

Here is an explanation of TOR, software that allows anonymous browsing on the internet:

, , , , , , , ,

No Comments