On Tue, Oct 08, 2013 at 09:24:45PM +0200, Marco Calamari wrote:
> On Sat, 2013-10-05 at 13:47 -0500, Ian Clarke wrote:
> > This doesn't have anything to do with the Silk Road takedown, if that is
> > what you are referring to.
> > 
> > The vulnerability there was "between keyboard and chair".
> 
> ... not only, in this case also in software ...
> 
> 2013 IEEE Symposium on Security and Privacy
> Trawling for Tor Hidden Services: 
> Detection, Measurement, Deanonymization
> Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
> <http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf>

Not related to the recent busts AFAICS?

There are published attacks on Tor (and on Freenet too). The FBI shut down a 
tor hidden service. The two are not necessarily connected; most times when 
something on Tor is attacked it's via javascript/SQL injection/etc. In this 
case I believe it was largely conventional police work.
> 
> > On Sat, Oct 5, 2013 at 1:26 PM, Robert Hailey 
> > <rob...@freenetproject.org>wrote:
> > 
> > >
> > > Is MITM the right term?
> > >
> > > Not to be picky... but I thought they just pulled the server that was
> > > serving up those particular hidden services and dropped in a new server
> > > with the "identify all users" exploit [if they were not controlling that
> > > server in the first place :-) ].

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to