Bitcoin Forum
May 06, 2024, 02:44:57 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: Hackers targeting Tor  (Read 391 times)
Kemarit
Legendary
*
Offline Offline

Activity: 3080
Merit: 1353



View Profile
October 20, 2019, 10:59:39 PM
 #41

Though I find this a little bit ironic, this incident only shows the importance of downloading apps from official sites only and not be enticed easily by supposedly trusted fellow netizens with their app recommendations!

I think netizens should also exercise more vigilance and always be cautious to prevent these types of incident from happening again but I think this will never change until there are people who are gullible - the reason why this kind of intrusions will never stop! Imho.

True, cyber criminals targeting other criminals? LOL. And come to think of it, the apps has been existing for 2 years and no one realized that they are using a fake TOR and for sure they have compromised a lot of Russians here. You can't blame them though, its carefully crafted and you won't really realized that you are using fake apps until one day you loss all your cryptos. So just be careful on apps that you downloaded in the net, simply as that.


▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715006697
Hero Member
*
Offline Offline

Posts: 1715006697

View Profile Personal Message (Offline)

Ignore
1715006697
Reply with quote  #2

1715006697
Report to moderator
1715006697
Hero Member
*
Offline Offline

Posts: 1715006697

View Profile Personal Message (Offline)

Ignore
1715006697
Reply with quote  #2

1715006697
Report to moderator
1715006697
Hero Member
*
Offline Offline

Posts: 1715006697

View Profile Personal Message (Offline)

Ignore
1715006697
Reply with quote  #2

1715006697
Report to moderator
panganib999
Hero Member
*****
Offline Offline

Activity: 1736
Merit: 589


View Profile WWW
October 21, 2019, 05:07:40 AM
 #42




Please be vigilant, always verify what you’re downloading & from where.


@coindesk
Hackers have been distributing a compromised version of the official Tor Browser that's packed with malware designed to steal bitcoin and spy on users. Security firm @ESET says it's been going on for "many years."

https://twitter.com/coindesk/status/1185165299450028033?s=21

@torproject

https://www.coindesk.com/fake-tor-browser-has-been-spying-stealing-bitcoin-for-years
Well this just shows how ironic things could fall into places. Sometimes being vigilant isn't enough, for there are lots of unexpected things that might happen in the most enexpected ways, it will be hard to manage safety. People should be taught not to take advantage of things so they won't be taken advantage of by other people ironically. They need to choose carefully what and where they are taking their applications from. To avoid this they should download it from the legitimate site and avoid piracy cause they are committing crime eventually being a victim of a crime, well ironically.
Artemis3
Legendary
*
Offline Offline

Activity: 2030
Merit: 1563


CLEAN non GPL infringing code made in Rust lang


View Profile WWW
October 21, 2019, 05:31:27 AM
 #43

people seriously have to get into the habit of either compiling from sources or verify the things they download and it goes for everything.

compiling from source is great habit to get into, but Tor Browser (or really, Firefox).... I've never tried that, but I get the feeling it takes alot of care. Of course, OS's that compile everything locally in their package manager must do this, so it can't be too hard. Not going to try it any time soon myself, however


It's also a reminder that crypto as a whole in no shape is even remotely close to mass adoption of common joe type of people.  Undecided

I find it embarrassing, and am myself feeling increasingly embarrassed as time goes on.

Most people use computers at the same level a child can teach itself to do, simply by watching and imitating. While these people watch their cat videos, I'm trying to learn basic computer science that (at it's core) hasn't changed much since the 1970's, and people are still using the crappy 1980's sub-par clone (i.e. windows) of the 1970's model.

Meanwhile, others apparently still haven't learned the basic rule number zero of the internet; if it's a popup, don't fucking click anywhere except on the close button, especially if it tells you 'click here or you'll die'. I learned that in the first month or so when the internet was still new. seriously ffs

If you trust your distro official binary packages, you should know most distro sign their packages after compiling and the package manager verifies this in case they have been somehow tampered by a rogue mirror or such. This simple concept has somehow evaded the windows world, like forever, which is why they have to do it manually, which of course given the laziness of the average windows user, they never do.

A typical windows user is used to the idea that binaries are downloaded from random web pages, the concept of an official repository is alien to them. Microsoft attempted something with their software shop thing, but with little success. (Bad) habits are hard to break, especially when reinforced over decades of IT malpractice.

Do you still get pop ups? I'm surprised, none of my browsers are allowed to do it, and my Desktop Environment seldom does it, except the occasional Want to save? prompt if i forgot saving a document or such. In Windows i remember some malware faking the whole popup so even the "close" button triggers whatever it wanted to trigger, its just a lost cause, there is no salvation for that OS.

There is Tor, and there is Tor Browser, which is Firefox with Tor bundled and a bunch of preset settings. I don't particularly like Tor Browser, as you can point any browser to Tor anyway, but it was made for lazy people, especially in Windows where its harder to explain people how to configure things properly. It beats me how could people use Tor in Windows to begin with, kinda defeats the whole idea, but even Satoshi apparently made that mistake, ugh.

I don't mind the 70ies, it also brought us the C language and the Unix kiss principle. Microsoft and others actually got into shortcuts, and some other not very fair practices such purchasing companies to deliver products they never had in the first place (See historical IBM/Microsoft DOS deal).

██████
███████
███████
████████
BRAIINS OS+|AUTOTUNING
MINING FIRMWARE
|
Increase hashrate on your Bitcoin ASICs,
improve efficiency as much as 25%, and
get 0% pool fees on Braiins Pool
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
October 21, 2019, 09:18:53 AM
 #44

If you trust your distro official binary packages, you should know most distro sign their packages after compiling and the package manager verifies this in case they have been somehow tampered by a rogue mirror or such. This simple concept has somehow evaded the windows world, like forever, which is why they have to do it manually, which of course given the laziness of the average windows user, they never do.

Right, but it's difficult for me to forget how recently this was broken...

aptitude package manager (Debian, Ubuntu & derivatives thereof use aptitude) had an issue in springtime 2019 where an attacker could bypass the signature checking on packages. Combine that expolit with  subversion of DNS resolution for an aptitude repo and then an attacker could serve bogus software updates and packages to all Debian based boxes (not hard as aptitude was still recommending configuring http links because signing packages is infallible!)

fixed now of course, but does anyone really know whether a malicious actor knew this beforehand, and now every Debian based machine has the latest greatest rootkit installed? fixing aptitude doesn't matter in that worst case scenario.

That situation immediately got me looking for alternative models; source based package managers, such as those in Gentoo, FreeBSD, Crux, Nix, Guix etc are looking very attractive. Nothing stops bugs in these package managers either, but the situation with aptitude demonstrates that having a limited number of repo mirrors serving package binaries is a more fragile model than I'd previously considered. At least a similar such bug in source based package managers would also require a simultaneous attack against dozens of different source code repos too (although targeting e.g. gnu git servers would be simple but effective in those circumstances, all easier said than done of course)

And is the Tor Browser even available through Linux software repos? It's available through the torporject repo... but we're coming onto the topic of Tor Browser itself further down...


A typical windows user is used to the idea that binaries are downloaded from random web pages, the concept of an official repository is alien to them. Microsoft attempted something with their software shop thing, but with little success. (Bad) habits are hard to break, especially when reinforced over decades of IT malpractice.

yeah, these people would be very easy to manipulate (hence the internal Electrum popup, which alot of people just assumed they could trust, because they didn't understand that popups could be coming from someone who is not the Electrum devs).


Do you still get pop ups? I'm surprised, none of my browsers are allowed to do it, and my Desktop Environment seldom does it, except the occasional Want to save? prompt if i forgot saving a document or such. In Windows i remember some malware faking the whole popup so even the "close" button triggers whatever it wanted to trigger, its just a lost cause, there is no salvation for that OS.

"unsolicited" popups literally haven't happened to me in years, it's possible I might be easier to trick because of that, provided the trick was clever enough.


There is Tor, and there is Tor Browser, which is Firefox with Tor bundled and a bunch of preset settings. I don't particularly like Tor Browser, as you can point any browser to Tor anyway, but it was made for lazy people, especially in Windows where its harder to explain people how to configure things properly. It beats me how could people use Tor in Windows to begin with, kinda defeats the whole idea, but even Satoshi apparently made that mistake, ugh.

Well, it's true that Tor Browser is little different than the regular Firefox browser. But even for users who don't use the tor network daemon from the Tor Browser Bundle (such as me), configuring Firefox to use Tor Browser's settings and plugins is not to be taken lightly... a large part of the Tor Browser set of presets is to make the browser difficult to fingerprint, which is a vast topic (which extends beyond the browser into the OS and the underlying hardware), so any small mistakes or oversights in a self-configured Firefox are guaranteed to weaken your anonymity.

As for satoshi... I get the feeling that maybe Windows was a way for satoshi to help obscure his/their identity further. It's pretty common for *nix users to also be proficient Windows users, or just capable of quickly learning the Windows way of doing something. What you're saying only underlines this point more: if satoshi really was using Windows the whole time while developing Bitcoin and communicating here on Bitcointalk.org, the chances that he was being surveilled by intelligence agencies are pretty high. It seems more likely that either being a Windows user was an elaborate smokescreen, or that satoshi was working with or for intelligence agencies all along. whether that's good or bad depends on what the objective of the Bitcoin project was Wink


I don't mind the 70ies, it also brought us the C language and the Unix kiss principle. Microsoft and others actually got into shortcuts, and some other not very fair practices such purchasing companies to deliver products they never had in the first place (See historical IBM/Microsoft DOS deal).

Yep, the Unix fundamentals and the C language are still incredibly relevant today. Android phones, all Apple devices and your home router are running and relying on those Unix basic components, and are reliable and secure in a large part because of Unix. And it's fundamentally the same as it was in the 1970's.

Microsoft are (and always were) a bunch of lazy crooks that won initially because they were well-connected in business, not because they had good products. Even if they produced some decent software since then (and I emphasize the "some"), both the foundations of their OS and their basic business ethics are irreparably rotten.

Vires in numeris
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!