So they put up a fake network, 'hacked' most of the nodes, and with complete control of their dummy network they were able to figure out traffic movement?
This is news why? -Travis On Mon, Oct 24, 2011 at 10:31 AM, Mohit Kumar <[email protected]>wrote: > French researchers from > ESIEA<http://www.esiea.fr/c/en/Web.Esiea.Public.cuke?>, > a French engineering school, have found and exploited some serious > vulnerabilities in the TOR network. They performed an inventory of the > network, finding 6,000 machines, many of whose IPs are accessible publicly > and directly with the system’s source code. They demonstrated that it is > possible to take control of the network and read all the messages that > circulate. > > But there are also hidden nodes, the Tor Bridges, which are provided by the > system that in some cases. Researchers have developed a script that, once > again, to identify them. They found 181. "*We now have a complete picture > of the topography of Tor*," said Eric Filiol. > > Read More at "The Hacker News" -- > http://thehackernews.com/2011/10/tor-anonymizing-network-compromised-by.html > -- > *Regards,* > *Owner,* > *The Hacker News <http://www.thehackernews.com/>* > *Truth is the most Powerful weapon against Injustice.* > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -- Twitter <https://twitter.com/tbiehn> | LinkedIn<http://www.linkedin.com/in/travisbiehn>| GitHub <http://github.com/tbiehn> | TravisBiehn.com<http://www.travisbiehn.com>
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
