PDA

View Full Version : Do you trust TOR? (the Onion Router) - think again!



crimethink
29th August 2016, 05:46 PM
NOTE: I do not approve in any way of child pornography (especially pre-pubescent). But neither do I believe in the molest of citizens by the Federal regime.


http://www.seattletimes.com/seattle-news/crime/fbis-massive-porn-sting-puts-internet-privacy-in-crossfire/

During the two weeks the FBI operated The Playpen, the bureau says visitors to the site accessed, posted or traded at least 48,000 images, 200 videos and 13,000 links to child pornography. At the same time, agents deployed a secret “Network Investigative Technique,” or NIT, to invade their computers, gather their personal information and send it back to the FBI.

According to court documents, between Feb. 20 and March 4, 2015, as many as 100,000 people logged onto the site, which was accessible only by using the anonymous “Tor” browser, which encrypts and routes internet traffic through thousands of other computers to hide the identity of a user.

Tor, which is used for private communications by government officials, lawyers, journalists, judges and others, was thought to be virtually uncrackable until news of the FBI’s operation became public.

Mozilla, the company that offers the Tor browser, asked the FBI to reveal its methods so it can be patched, warning in a court motion that, “absent great care, the security of millions of individuals using Mozilla’s Firefox internet browser could be put at risk” by its disclosure. The Tacoma judge denied the request.

Ares
29th August 2016, 05:57 PM
Yep I trust Tor, but I don't trust Mozilla which is how the FBI compromised these users. They found an exploit in the Tor Browser Bundle to execute code and send the FBI information about the user. They found a similar hole when they took over freedom hosting and nabbed the Dread Pirate Roberts. The Capcha during the login at the Silk Road is what they used as it leaked the users real IP address.

Tor itself still hasn't been compromised from what I can tell. The FBI didn't reveal how it accomplished it, but since they fought Mozilla in revealing the hack it tells me that it could be patched in the browser.

crimethink
29th August 2016, 06:13 PM
My position has remained the same for literally decades: trust no encryption with anything that can put you in a cage.

Do not trust PGP, TOR, a VPN, anything, with data that the Federal regime (or local equivalent) has reason to use to personally destroy you.

Is encryption good for most purposes against private entities? Likely yes.

Is encryption good for most purposes against major state-level actors? Absolutely not.

It is assumed that the TOR browser is the problem, but that could be a red herring - only part or even none of the problem.

Never ever discuss anything of major "illegality" online, over the phone, or in any manner except face-to-face, sans any electronic devices in earshot.

Cebu_4_2
29th August 2016, 06:16 PM
Anyone that uses this for child porn deserves to be cut from society, all, the suppliers and recipients. Anything else is fair game.

Alex Drone
29th August 2016, 08:34 PM
I use TOR and I use VPN, but I seldom use both at the same time. I am not doing anything illegal, but I am on sites such as this, Renegade, etc.

Hitch
29th August 2016, 08:42 PM
Fuck TOR. Any you assholes that use it, can go fuck off, imo.

This is how evil infiltrates our society.

I'm not as religious as a lot of folks here. But TOR, wake up, it's literally the devil trying to grab onto weak souls. It's weakness, that it gets its strength.

The Devil works in a lot of different ways, and this is one of them.

crimethink
29th August 2016, 10:04 PM
Fuck TOR. Any you assholes that use it, can go fuck off, imo.

This is how evil infiltrates our society.

I'm not as religious as a lot of folks here. But TOR, wake up, it's literally the devil trying to grab onto weak souls. It's weakness, that it gets its strength.

The Devil works in a lot of different ways, and this is one of them.

I'm not sure what you mean. TOR isn't used only for perversion, drug abuse, or general criminality. It does have its place against regimes like Saudi Arabia, etc. It is also useful to protect oneself from the Copyright Cartel.

Ares
30th August 2016, 04:38 AM
The Devil works in a lot of different ways, and this is one of them.

The Devil works through Onion Routing???

:rolleyes:

PatColo
30th August 2016, 04:45 AM
from Dec '12, Thread: DARPA Exposed - Corbett Report Radio 265 (http://gold-silver.us/forum/showthread.php?65738-DARPA-Exposed-Corbett-Report-Radio-265)









48 mins:
http://www.youtube.com/watch?v=iq2V_LkgRdo

http://www.youtube.com/watch?v=iq2V_LkgRdo

Download (http://www.corbettreport.com/mp3/crr265.mp3) < MP3 if you prefer to just listen

The internet. GPS. Windows. Videoconferencing. Siri. Smart dust. Why isn’t it common knowledge that these technologies started as DARPA-funded projects? When the government, defense contractors and tech giants team up to create the next generation of military technology, who wins and who loses? Find out on tonight’s broadcast.

WORKS CITED:
Army of Extreme Thinkers (http://articles.latimes.com/2003/aug/14/science/sci-darpa14)
12 Insane But True DARPA Projects (http://nakedlaw.avvo.com/government/12-insane-but-true-darpa-projects.html)
Fifty years of DARPA: Hits, misses and ones to watch (http://www.newscientist.com/article/dn13907)
FANG Challenge: Design a Next-Generation Military Ground Vehicle (https://www.youtube.com/watch?v=TMa1657gYIE)
10 brilliant DARPA inventions (http://www.pcpro.co.uk/features/373546/10-brilliant-darpa-inventions)
Director of DARPA departs Pentagon for Google (http://www.activistpost.com/2012/03/director-of-darpa-departs-pentagon-for.html)
High-Traffic Colluding Tor Routers in Washington (http://cryptogon.com/?p=624)
Creepy DARPA Robots (https://www.youtube.com/watch?v=mdYSStF4fqc)
Future World – Smart Dust (https://www.youtube.com/watch?v=GvdGggusRYU)
Berkeley Smart Dust Project (http://robotics.eecs.berkeley.edu/~pister/SmartDust/)
DARPA Project List (http://www.technovelgy.com/ct/technology-article.asp?artnum=59)

^ 35:20 he starts getting into "private/anon 'net surfing" via the TOR network. And raises questions about just how private it is, or is it another spook data mining venue.

Santa
30th August 2016, 06:55 AM
My default position is that any illegal product site is just another spook data mining venue.

Ares
30th August 2016, 07:07 AM
My default position is that any illegal product site is just another spook data mining venue.

If not, it's most likely setup to steal your cryptocoin like so many others that have sprung up post Silk road.