Bitcoin Forum
November 18, 2024, 01:33:50 AM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: Half of all Tor sites compromised, Freedom Hosting founder arrested.  (Read 5091 times)
oda.krell
Legendary
*
Offline Offline

Activity: 1470
Merit: 1007



View Profile
August 05, 2013, 11:39:10 AM
 #41

Tor was not compromised. Only the servers hosting half of the hidden service and users browser if JS was not disabled.

For those only skimming this thread, this is the correct answer. (doesn't mean it isn't pretty bad, but an important distinction to be made nonetheless)

Not sure which Bitcoin wallet you should use? Get Electrum!
Electrum is an open-source lightweight client: fast, user friendly, and 100% secure.
Download the source or executables for Windows/OSX/Linux/Android from, and only from, the official Electrum homepage.
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
August 05, 2013, 12:46:46 PM
Last edit: September 16, 2013, 08:39:37 PM by Maged
 #42

Quote

In any case, wouldn't it be possible to build it right into the browser? I mean, everything in the browser, all plug-ins, etc... would either not work, or would have to go through tor. Thatd be much more convenient than having to completely re-boot into an entirely different OS just to use tor.
You don't need to reboot anything. It's working with 2 virtual machine on top of your actual OS.
2weiX
Legendary
*
Offline Offline

Activity: 2058
Merit: 1005

this space intentionally left blank


View Profile
August 05, 2013, 12:50:12 PM
 #43

Quote

In any case, wouldn't it be possible to build it right into the browser? I mean, everything in the browser, all plug-ins, etc... would either not work, or would have to go through tor. Thatd be much more convenient than having to completely re-boot into an entirely different OS just to use tor.
You don't need to reboot anything. It's working with 2 virtual machine on top of your actual OS.

Or something like this: http://learn.adafruit.com/onion-pi/overview
01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
August 05, 2013, 12:56:25 PM
 #44

Quote

In any case, wouldn't it be possible to build it right into the browser? I mean, everything in the browser, all plug-ins, etc... would either not work, or would have to go through tor. Thatd be much more convenient than having to completely re-boot into an entirely different OS just to use tor.
You don't need to reboot anything. It's working with 2 virtual machine on top of your actual OS.

Or something like this: http://learn.adafruit.com/onion-pi/overview
Very nice I might try to build one.
Kazu
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
August 05, 2013, 04:28:29 PM
 #45

Kids, the way to use Tor is to have your firewall to intercept ALL your outgoing connections and route em via Tor proxy. Flash or no flash.


How does one go about doing this?

CoinLenders - Bitcoin Bank Script / Demo
1v.io/kazu - 15ccW7m6RxDFWEKc3P1NdwWpX1N1pU7gZ8
FreedomCoin
Hero Member
*****
Offline Offline

Activity: 675
Merit: 507


Freedom to choose


View Profile
August 05, 2013, 08:07:18 PM
 #46

1. Disable JS
2. Enable NS
3. Use VPN for backup connection, NOT directly from your ISP.

4. be smart

notme
Legendary
*
Offline Offline

Activity: 1904
Merit: 1002


View Profile
August 08, 2013, 02:26:16 PM
Last edit: August 12, 2013, 09:02:04 PM by notme
 #47

Wow, thats super legit. Somebody should build a chrome-os type thing off of that for clients. Its made for that type of thing. Problem is youd likely get very bad load times, am I right? Still, I'm sure some people would have a use for it.

Wow, with Whonix & Bitcoin, its possible to practically use the entirity of the internet, payments & all, without any privacy concerns whatsoever. Its good to the point of being disconcerting.

No.  Technology can not alleviate all privacy concerns.  You still need to engage your brain.  Even sentence structure and word choice habits can be used to pinpoint your identity.

Quote
In any case, wouldn't it be possible to build it right into the browser? I mean, everything in the browser, all plug-ins, etc... would either not work, or would have to go through tor. Thatd be much more convenient than having to completely re-boot into an entirely different OS just to use tor.

Again, no.  If you do it all in the browser, you expose yourself to browser exploits.  Browsers have pretty much the largest attack surface of any major piece of software.  Even with an OS based solution, you are vulnerable to kernel exploits.  However, kernels receive much better auditing and have a much smaller attack surface.

https://www.bitcoin.org/bitcoin.pdf
While no idea is perfect, some ideas are useful.
bernard75
Legendary
*
Offline Offline

Activity: 1316
Merit: 1003



View Profile
September 16, 2013, 05:19:57 PM
 #48

http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/
AntiOps
Newbie
*
Offline Offline

Activity: 42
Merit: 0



View Profile
September 16, 2013, 08:50:21 PM
 #49

Tor was not compromised. Only the servers hosting half of the hidden service and users browser if JS was not disabled.

For those only skimming this thread, this is the correct answer. (doesn't mean it isn't pretty bad, but an important distinction to be made nonetheless)

Thanks
Zeek_W
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250



View Profile
September 17, 2013, 06:15:02 AM
 #50

Well isn't that something! I just assumed most exit nodes were honeypots and never bothered snooping around .onion sites.

bernard75
Legendary
*
Offline Offline

Activity: 1316
Merit: 1003



View Profile
September 17, 2013, 06:18:23 AM
 #51

This is an interesting point.
Why would the NSA infiltrate the network if they developed it and control enough exit nodes to keep extensive logs anyway?
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!