Posts: 1,312   +378
Staff
Tor Uncovered: Tor is an overlay network designed to provide a fully anonymous way to browse the web and exchange messages or data over the internet. The "darknet" is supposed to be free from eavesdropping and surveillance, but resourceful agencies can still breach its many onion-like layers to go and get a suspect's true identity.

German news outlet Tagesschau reports that local law enforcement agencies have successfully targeted, tracked, and arrested four suspects in a single investigation. The outlaws used Tor to hide their identities and activities in managing a ransomware operation and hosting child sex abuse material (CSAM) on their servers.

Investigators identified the suspects using a "timing analysis" attack. The officers directly monitored many Tor nodes over time, looking for a specific connection between the servers hidden within the darknet and local internet connections. The story confirms that law enforcement agencies are actively monitoring web servers hidden in Tor.

Authorities tracked four people in their investigation, eventually taking over the Tor address belonging to a ransomware group. Police redirected its traffic to a new page to prevent users from sharing previously stolen encrypted files. Then, the investigators used timing analysis techniques to uncover the identity of "Andres G," an individual operating a .onion service known as "Boystown" that hosted CSAM.

Successfully uncovering who's behind a darknet service is no easy feat, and authorities haven't revealed significant details about their timing analysis attack. Developers from the Tor Project claim a suspect tracked by German authorities was using an old version of the Tor-based, decentralized instant messaging application Ricochet.

The Tor team said the Ricochet user was "fully de-anonymized" through a guard discovery attack. The outdated Ricochet release didn't protect against timing analysis. Developers addressed this shortcoming in a new application fork (Ricochet-Refresh). This version is fully maintained and offers better privacy for freely chatting (and exchanging files) within the darknet.

The developers claim that users can only access Onion services from within the Tor network, so any discussion about monitoring exit nodes is irrelevant. The network is healthier than ever, with over 2,000 new exit nodes coming online over the past few years. An "exit node" is the last hidden Tor node a user connects to before going on the clearnet, acting as the originator of the communication from an ISP's point of view.

"Like many of you, we are still left with more questions than answers," the Tor programmer said. "But one thing is clear: Tor users can continue to use Tor Browser to access the web securely and anonymously."

Permalink to story:

 
Nothing is really safe. Don't break the law and then you won't have to even use this kind of crap.
 
Nothing is really safe. Don't break the law and then you won't have to even use this kind of crap.

Tor is not "crap". And criminals aren't the only ones using it to conceal their presence on-line. I use it often, for several reasons, and I'm not breaking the law just for that.
 
Tor is not "crap". And criminals aren't the only ones using it to conceal their presence on-line. I use it often, for several reasons, and I'm not breaking the law just for that.
"Several reasons" but not even one given.
Good chat...
 
Breaking the law is an excuse for every law enforcement to read everything. Society falling apart and they still think it's not their fault. Disintegration of trust kills civilizations.
 
TOR is like any other tool, VPN , a crappy master lock padlock , an std C4 yale lock etc It's good enough for most people day to day.

Given that corps like VISA have knowlingly and on purpose allow their Cards to be more vulnerable than needed, as 1% fraud is "acceptable" . I've always disagree with this strategy, as mirrors one broken window , one graffitti principle. ie wipe it out straightaway , never allow it to start. In long run the 1% is probably more money wise more expensive, completely ignoring human costs. banks do same BS, eg 4 digit pin codes on non-random devices ( ie numbers in exactly same spots, to aid muscle memory ) . Plus your CVV number has high contrast on your card, so easy to read ( scrape it off fellow readers )
TOR is perfectly fine for most people doing nothing in particular eg piracy or **** posting whatever on the grey scale
 
"Several reasons" but not even one given.
Good chat...
Tor is sometimes the only way people under oppressive regimes can get access to free information. Believe it or not, there are more legitimate users of tor in than illegitimate. China and Brazil are two MASSIVE ones.

Believe it or not, there are still billions of people who do not have free speach and can be arrested for things as petty as saying their president is an *****. Imagine if they started throwing people in jail for saying Trump or Biden were *****s, Tor would become popular REAL quick.
 
"Like many of you, we are still left with more questions than answers," the Tor programmer said. "But one thing is clear: Tor users can continue to use Tor Browser to access the web securely and anonymously."

You can't keep shoving free speech all the time when there was a obvious network running with CP.

 

Similar threads