Bitcoin Forum
May 03, 2024, 04:08:21 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 »  All
  Print  
Author Topic: Half of all Tor sites compromised, Freedom Hosting founder arrested.  (Read 5050 times)
fr33d0miz3r
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


View Profile
August 05, 2013, 12:46:08 AM
 #21

dencentralized domain name service .bit

you mean .adamstgBit ?

Seriuosly, domain names .onion are not affected. There are problems with hosting service.
Namecoin can't resolve problems with hostings, JS exploits, etc.
1714709301
Hero Member
*
Offline Offline

Posts: 1714709301

View Profile Personal Message (Offline)

Ignore
1714709301
Reply with quote  #2

1714709301
Report to moderator
1714709301
Hero Member
*
Offline Offline

Posts: 1714709301

View Profile Personal Message (Offline)

Ignore
1714709301
Reply with quote  #2

1714709301
Report to moderator
1714709301
Hero Member
*
Offline Offline

Posts: 1714709301

View Profile Personal Message (Offline)

Ignore
1714709301
Reply with quote  #2

1714709301
Report to moderator
"Bitcoin: the cutting edge of begging technology." -- Giraffe.BTC
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714709301
Hero Member
*
Offline Offline

Posts: 1714709301

View Profile Personal Message (Offline)

Ignore
1714709301
Reply with quote  #2

1714709301
Report to moderator
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
August 05, 2013, 12:46:14 AM
 #22

Tor was not compromised. Only the servers hosting half of the hidden service and users browser if JS was not disabled.
ElectricMucus
Legendary
*
Offline Offline

Activity: 1666
Merit: 1057


Marketing manager - GO MP


View Profile WWW
August 05, 2013, 12:46:37 AM
 #23

Time to come up with a more hardened alternative to tor. The problem is that on a hidden service the content is accessible in clear text at the physical location. With 3rd party hosting the cloud should run on a shared virtual machine where information is encrypted at all points. This might be possible to do even with tor, or not.
There is supposedly this thing: https://github.com/Miserlou/OnionCloud

But I get the feeling that's not enough.
vokain
Legendary
*
Offline Offline

Activity: 1834
Merit: 1019



View Profile WWW
August 05, 2013, 01:28:49 AM
 #24

If i remember correctly there was a type of tormail you could use that did not use javascript when accessing your email
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
August 05, 2013, 01:33:57 AM
 #25

If i remember correctly there was a type of tormail you could use that did not use javascript when accessing your email
You had the choice between http://roundcube.net and http://squirrelmail.org

I think Squirelmail don't need JS.
vokain
Legendary
*
Offline Offline

Activity: 1834
Merit: 1019



View Profile WWW
August 05, 2013, 01:42:20 AM
 #26

If i remember correctly there was a type of tormail you could use that did not use javascript when accessing your email
You had the choice between http://roundcube.net and http://squirrelmail.org

I think Squirelmail don't need JS.

you're right, that one didn't.
BitCoiner2012
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250



View Profile
August 05, 2013, 02:22:59 AM
 #27

I am still a bit confused, are the users that were injected/infected the ones affected, or all users of the Tormail, IE the database and all data within it? I really can't derive this from the story. Both are important, but one is a lot more potent!

BTC Long.
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
August 05, 2013, 02:27:11 AM
 #28

I am still a bit confused, are the users that were injected/infected the ones affected, or all users of the Tormail, IE the database and all data within it? I really can't derive this from the story. Both are important, but one is a lot more potent!

Quote
According to a Sunday blog post by the Tor Project's Executive Director, Andrew Lewman, the servers of Freedom Hosting were breached before the service went offline. "From what is known so far, the breach was used to configure the server in a way that it injects some sort of JavaScript exploit in the Web pages delivered to users,"  Lewman wrote. "This exploit is used to load a malware payload to infect user's computers.

They most likely dumped all databases if they could but didn't physically seized the servers since they don't know the exact location.

Quote
The servers themselves are likely run on a "bulletproof" hosting service in Romania or Russia; Irish law enforcement authorities told the court Friday that Marques had transferred large sums of money to accounts in Romania and had been investigating obtaining a visa to enter Russia.
http://arstechnica.com/tech-policy/2013/08/alleged-tor-hidden-service-operator-busted-for-child-porn-distribution
DogtownHero
Member
**
Offline Offline

Activity: 70
Merit: 10

j-coin//just 4 cpu's


View Profile
August 05, 2013, 02:31:26 AM
 #29

tor is neither anonymous, or secure. you're all a bunch of fucking idiots. its a NSA spying network, and you idiots keep taking the bait.

Kazu
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
August 05, 2013, 02:43:33 AM
 #30

Forgive me if I'm being naiive, but this doesn't quite make sense to me?

So somehow freedom hosting was hacked, and the hacker put some malicious JS on each of freedom hosting's hosted websites, and used that hack to put software on freedom hosting's machine to ascertain its location. That part seems reasonable & believable. But, apparently the JS somehow got at the viewer's IP? That seems like, sorta a major bug in the Tor software? Couldn't any admin anywhere use that code to get at the viewer's IP, in theory? Unless I'm understanding something wrong?

EDIT: so the tor browser had some sort of a glitch that allowed malware to be downloaded to the computers, and then apparently ping one of the attacker's computers outside of tor to get the IP of the viewer?

CoinLenders - Bitcoin Bank Script / Demo
1v.io/kazu - 15ccW7m6RxDFWEKc3P1NdwWpX1N1pU7gZ8
humanitee
Hero Member
*****
Offline Offline

Activity: 1302
Merit: 502



View Profile
August 05, 2013, 02:47:14 AM
 #31

Forgive me if I'm being naiive, but this doesn't quite make sense to me?

So somehow freedom hosting was hacked, and the hacker put some malicious JS on each of freedom hosting's hosted websites, and used that hack to put software on freedom hosting's machine to ascertain its location. That part seems reasonable & believable. But, apparently the JS somehow got at the viewer's IP? That seems like, sorta a major bug in the Tor software? Couldn't any admin anywhere use that code to get at the viewer's IP, in theory? Unless I'm understanding something wrong?

EDIT: so the tor browser had some sort of a glitch that allowed malware to be downloaded to the computers, and then apparently ping one of the attacker's computers outside of tor to get the IP of the viewer?

Basically you can do that with Flash, Javascript, and a few other web languages.

Usually NoScript stops all these things in the browser bundle, but they don't have it enabled by default because it breaks a lot of sites and they are trying to capture more, less savvy users.

▄▄▄██████▄▄▄
▄███▀▀▀▀▀████▄▄ █▄▄
▄▄          ▀▀████▄  ██▄
█████▄            ▀█████  ██▄
▄█████████           ▀█████ ███▄
▄█████████▀▀           ▀█████ ███▄
▄███  █████             ▀█████ ████
███  █████                █████ ████
███ █████                  ████  ████
███ █████                ▄████  ████
███ █████                ███████████
▀██ █████▄                █████████
▀██ ██████▄                ▀█████
▀██ ███████                  ▀▀▀
▀██ ██████▄▄                 
▀██ ██████▄▄▄▄▄▄▄▄▄▄▄▄███▀
▀▀ █████████████████▀
▀▀▀██████▀▀▀▀

Fast, Secure, and Fully

DecentralizeTrading
BACKED BY:
─────────────────────────
BINANCE
─────── LAB
&█████████████████████████████████ █  ███
█▀    ▀█  ███▀▀▀▀▀████████  ████▀▀███▀ █
█  █████    ▄▄▄▄▄  █  ▀  █    ███  █  ██
█▄    ▀█  ██       █  ▄███  ██████   ███
█████  █  ██  ███  █  ████  ████  ▄  ███
█▄    ▄█▄  ▄█▄     ▀  ████▄  ▄█   ██  ██
████████████████████████████████████████


  Whitepaper
 Medium
Reddit
Kazu
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
August 05, 2013, 02:49:22 AM
 #32

Forgive me if I'm being naiive, but this doesn't quite make sense to me?

So somehow freedom hosting was hacked, and the hacker put some malicious JS on each of freedom hosting's hosted websites, and used that hack to put software on freedom hosting's machine to ascertain its location. That part seems reasonable & believable. But, apparently the JS somehow got at the viewer's IP? That seems like, sorta a major bug in the Tor software? Couldn't any admin anywhere use that code to get at the viewer's IP, in theory? Unless I'm understanding something wrong?

EDIT: so the tor browser had some sort of a glitch that allowed malware to be downloaded to the computers, and then apparently ping one of the attacker's computers outside of tor to get the IP of the viewer?

Basically you can do that with Flash, Javascript, and a few other web languages.

Usually NoScript stops all these things in the browser bundle, but they don't have it enabled by default because it breaks a lot of sites and they are trying to capture more, less savvy users.

What? Then whats the entire point of tor? Wtf?

I still don't see how JS is getting my IP, though. I'm using TOR, the browser is the TOR browser. I assume (i'm not an expert) that all connections through that browser have to hop through tor, right? So how is the JS opening the connection outside of TOR, in order to get the IP?

CoinLenders - Bitcoin Bank Script / Demo
1v.io/kazu - 15ccW7m6RxDFWEKc3P1NdwWpX1N1pU7gZ8
BitCoiner2012
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250



View Profile
August 05, 2013, 02:53:44 AM
 #33

Forgive me if I'm being naiive, but this doesn't quite make sense to me?

So somehow freedom hosting was hacked, and the hacker put some malicious JS on each of freedom hosting's hosted websites, and used that hack to put software on freedom hosting's machine to ascertain its location. That part seems reasonable & believable. But, apparently the JS somehow got at the viewer's IP? That seems like, sorta a major bug in the Tor software? Couldn't any admin anywhere use that code to get at the viewer's IP, in theory? Unless I'm understanding something wrong?

EDIT: so the tor browser had some sort of a glitch that allowed malware to be downloaded to the computers, and then apparently ping one of the attacker's computers outside of tor to get the IP of the viewer?

Basically you can do that with Flash, Javascript, and a few other web languages.

Usually NoScript stops all these things in the browser bundle, but they don't have it enabled by default because it breaks a lot of sites and they are trying to capture more, less savvy users.

What? Then whats the entire point of tor? Wtf?

I still don't see how JS is getting my IP, though. I'm using TOR, the browser is the TOR browser. I assume (i'm not an expert) that all connections through that browser have to hop through tor, right? So how is the JS opening the connection outside of TOR, in order to get the IP?

From what I understand it basically drops a little bomb that ticks off a ping when you use the browser outside of TOR, or something to that extent. I could be completely mistaken.

BTC Long.
dwma
Sr. Member
****
Offline Offline

Activity: 405
Merit: 250


View Profile
August 05, 2013, 02:54:29 AM
 #34


What? Then whats the entire point of tor? Wtf?

I still don't see how JS is getting my IP, though. I'm using TOR, the browser is the TOR browser. I assume (i'm not an expert) that all connections through that browser have to hop through tor, right? So how is the JS opening the connection outside of TOR, in order to get the IP?
Not a problem with Tor.  A problem with people using poorly configured web-browsers waiting to be exploited to reveal IP.  I think if you download a respectable TOR package then it will have javascript disabled by default.  A site really bent on security should run a javascript capability test and enforce it upon users.

TOR is a networking tunnel system.  Your computer is still connected to the internet with an IP address.  Not sure how many people turned on javascript or failed to turn it off.  The javascript could also create cookies which could be queried elsewhere.  I am not sure of specifics but cookies and javascript would be the downfall.  

Again - research browser packages.  Trying to set all the stuff up yourself is asking to have these exploits left open. (but might possibly save you from nefarious third-parties if the tor browser package has been compromised.)
humanitee
Hero Member
*****
Offline Offline

Activity: 1302
Merit: 502



View Profile
August 05, 2013, 02:59:45 AM
 #35

What? Then whats the entire point of tor? Wtf?

I still don't see how JS is getting my IP, though. I'm using TOR, the browser is the TOR browser. I assume (i'm not an expert) that all connections through that browser have to hop through tor, right? So how is the JS opening the connection outside of TOR, in order to get the IP?

It's a script so it can do quite a number of things. One thing it can do is launch different protocol handlers, ie. Flash, which when launched won't know to connect through the Tor client and will connect through your regular connection - because that's what it does by default. So you'd load the site on Tor and some component thereof on your regular connection, which needless to say, compromises your identity.

▄▄▄██████▄▄▄
▄███▀▀▀▀▀████▄▄ █▄▄
▄▄          ▀▀████▄  ██▄
█████▄            ▀█████  ██▄
▄█████████           ▀█████ ███▄
▄█████████▀▀           ▀█████ ███▄
▄███  █████             ▀█████ ████
███  █████                █████ ████
███ █████                  ████  ████
███ █████                ▄████  ████
███ █████                ███████████
▀██ █████▄                █████████
▀██ ██████▄                ▀█████
▀██ ███████                  ▀▀▀
▀██ ██████▄▄                 
▀██ ██████▄▄▄▄▄▄▄▄▄▄▄▄███▀
▀▀ █████████████████▀
▀▀▀██████▀▀▀▀

Fast, Secure, and Fully

DecentralizeTrading
BACKED BY:
─────────────────────────
BINANCE
─────── LAB
&█████████████████████████████████ █  ███
█▀    ▀█  ███▀▀▀▀▀████████  ████▀▀███▀ █
█  █████    ▄▄▄▄▄  █  ▀  █    ███  █  ██
█▄    ▀█  ██       █  ▄███  ██████   ███
█████  █  ██  ███  █  ████  ████  ▄  ███
█▄    ▄█▄  ▄█▄     ▀  ████▄  ▄█   ██  ██
████████████████████████████████████████


  Whitepaper
 Medium
Reddit
DogtownHero
Member
**
Offline Offline

Activity: 70
Merit: 10

j-coin//just 4 cpu's


View Profile
August 05, 2013, 03:03:14 AM
 #36

fucktards are gonna be fucktards, all there is to it.

Kazu
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
August 05, 2013, 03:09:32 AM
 #37

What? Then whats the entire point of tor? Wtf?

I still don't see how JS is getting my IP, though. I'm using TOR, the browser is the TOR browser. I assume (i'm not an expert) that all connections through that browser have to hop through tor, right? So how is the JS opening the connection outside of TOR, in order to get the IP?

It's a script so it can do quite a number of things. One thing it can do is launch different protocol handlers, ie. Flash, which when launched won't know to connect through the Tor client and will connect through your regular connection - because that's what it does by default. So you'd load the site on Tor and some component thereof on your regular connection, which needless to say, compromises your identity.

Wow, I thought tor protected you from this kind of hack in some way. Isn't there some way of stopping all non-tor connections automatically? I mean, like doing some way of catching all traffic that isn't through tor, and blocking it all. Clearly it would get in the way sometimes, but going without JS sorta makes the majority of websites useless.

I was under the impression there was some 0-day firefox exploit that allowed the hacker to download some .exe (or equiv) file to the client computer and execute it, and get the IP in that way.

In a perfect world, there would be an https-style warning "this site is attempting to display some content to you outside of the tor network, do you want to allow" or the like.

CoinLenders - Bitcoin Bank Script / Demo
1v.io/kazu - 15ccW7m6RxDFWEKc3P1NdwWpX1N1pU7gZ8
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
August 05, 2013, 03:10:29 AM
 #38

What? Then whats the entire point of tor? Wtf?

I still don't see how JS is getting my IP, though. I'm using TOR, the browser is the TOR browser. I assume (i'm not an expert) that all connections through that browser have to hop through tor, right? So how is the JS opening the connection outside of TOR, in order to get the IP?

It's a script so it can do quite a number of things. One thing it can do is launch different protocol handlers, ie. Flash, which when launched won't know to connect through the Tor client and will connect through your regular connection - because that's what it does by default. So you'd load the site on Tor and some component thereof on your regular connection, which needless to say, compromises your identity.

Wow, I thought tor protected you from this kind of hack in some way. Isn't there some way of stopping all non-tor connections automatically? I mean, like doing some way of catching all traffic that isn't through tor, and blocking it all. Clearly it would get in the way sometimes, but going without JS sorta makes the majority of websites useless.

I was under the impression there was some 0-day firefox exploit that allowed the hacker to download some .exe (or equiv) file to the client computer and execute it, and get the IP in that way.

In a perfect world, there would be an https-style warning "this site is attempting to display some content to you outside of the tor network, do you want to allow" or the like.

Quote
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network[5], Debian GNU/Linux[6] and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.
Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.
https://whonix.org/wiki/Main_Page
Kazu
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
August 05, 2013, 05:09:04 AM
 #39

What? Then whats the entire point of tor? Wtf?

I still don't see how JS is getting my IP, though. I'm using TOR, the browser is the TOR browser. I assume (i'm not an expert) that all connections through that browser have to hop through tor, right? So how is the JS opening the connection outside of TOR, in order to get the IP?

It's a script so it can do quite a number of things. One thing it can do is launch different protocol handlers, ie. Flash, which when launched won't know to connect through the Tor client and will connect through your regular connection - because that's what it does by default. So you'd load the site on Tor and some component thereof on your regular connection, which needless to say, compromises your identity.

Wow, I thought tor protected you from this kind of hack in some way. Isn't there some way of stopping all non-tor connections automatically? I mean, like doing some way of catching all traffic that isn't through tor, and blocking it all. Clearly it would get in the way sometimes, but going without JS sorta makes the majority of websites useless.

I was under the impression there was some 0-day firefox exploit that allowed the hacker to download some .exe (or equiv) file to the client computer and execute it, and get the IP in that way.

In a perfect world, there would be an https-style warning "this site is attempting to display some content to you outside of the tor network, do you want to allow" or the like.

Quote
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network[5], Debian GNU/Linux[6] and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.
Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.
https://whonix.org/wiki/Main_Page

Wow, thats super legit. Somebody should build a chrome-os type thing off of that for clients. Its made for that type of thing. Problem is youd likely get very bad load times, am I right? Still, I'm sure some people would have a use for it.

Wow, with Whonix & Bitcoin, its possible to practically use the entirity of the internet, payments & all, without any privacy concerns whatsoever. Its good to the point of being disconcerting.

In any case, wouldn't it be possible to build it right into the browser? I mean, everything in the browser, all plug-ins, etc... would either not work, or would have to go through tor. Thatd be much more convenient than having to completely re-boot into an entirely different OS just to use tor.


CoinLenders - Bitcoin Bank Script / Demo
1v.io/kazu - 15ccW7m6RxDFWEKc3P1NdwWpX1N1pU7gZ8
fr33d0miz3r
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


View Profile
August 05, 2013, 10:59:22 AM
 #40

Kids, the way to use Tor is to have your firewall to intercept ALL your outgoing connections and route em via Tor proxy. Flash or no flash.


Agreed. Correct settings and no problem.
Pages: « 1 [2] 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!