recentpopularlog in

mcherm : tor   20

Building a new Tor that can resist next-generation state surveillance | Ars Technica UK
A survey of the current state of items that are being built to replace or complement TOR.
anonyminity  privacy  via:HackerNews  ArsTechnica  tor 
september 2016 by mcherm
Yardbird's Effective Usenet Tradecraft - Hacker OPSEC
What we can learn about security practices of a covert group by looking at a ring of child pornographers 2/3 of whom survived an extended and deep law enforcement investigation.
via:HackerNews  security  tor 
july 2016 by mcherm
Judge Who Authorized Police Search of Seattle Privacy Activists Wasn't Told They Operate Tor Network - Slog - The Stranger
There are no penalties for misleading a judge when getting a search warrant, so that's apparently what these police did to crack down on someone operating a Tor exit node.
law  tor  police  policeimmunity 
april 2016 by mcherm
Justice Department to Judge: Tor Users Have No Expectation of Privacy | Motherboard
Justice Department claims users of tor expect their IP address to be public.
law  privacy  tor  via:reddit 
february 2016 by mcherm
81% of Tor users can be de-anonymised by analysing router information, research indicates
Evil entry port + traffic monitoring at exit and with colluding server means you can track most Tor traffic.
tor  security  cryptography  privacy  via:reddit 
november 2014 by mcherm
Visit the Wrong Website, and the FBI Could End Up in Your Computer | Threat Level | WIRED
How the FBI is planting malware on TOR sites to de-anonymize the users.
tor  security 
august 2014 by mcherm
Hot or Not: Revealing Hidden Services by their Clock Skew
An astounding side channel attack to locate a TOR server. Close observation can detect even tiny clock drifts. Quartz clocks change speed with temperature. CPU load changes temperature. Use this to probe even TOR hidden services to find if they are on a target machine and if they share space with another TOR service.
security  blogworthy  privacy  tor  anonyminity  sidechannelattack  via:reddit 
may 2014 by mcherm
Schneier on Security: How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
Bruce Schneier explains how the NSA is hacking everyone who tries to use Tor.
security  nsa  tor  BruceSchneier  via:reddit 
february 2014 by mcherm
TOR susceptible to timing attacks
3-6 months for a big government to identify an individual.
via:reddit  privacy  anonymity  security  tor 
september 2013 by mcherm
Meet The Dread Pirate Roberts, The Man Behind Booming Black Market Drug Website Silk Road - Forbes
A bio of the anonymous person running The Silk Road, an anonymous online drug marketplace. Imagine being hunted by governments to the extent that this person must be.
via:HackerNews  drugs  tor  privacy  security  bitcoin  anonymity 
august 2013 by mcherm
[tor-talk] Help users in Iran reach the internet
All secure connections are being blocked from in Iran. Here is Tor trying to do what they can (which isn't much).
cryptography  security  tor  internet  via:HackerNews 
february 2012 by mcherm
How the Great Firewall of China Blocks Tor | threatpost
China can detect and block Tor. They send probes to the machines to which users are making encrypted connections and begin the Tor exchange protocol until they get far enough to get some identifying behavior. This is phenomenally difficult to defend against.
security  china  tor  anonyminity 
january 2012 by mcherm
Tor Nodes Charity
A project to accept donations and use them to run TOR nodes.
tor  eff  security  via:boingboing 
october 2011 by mcherm
Iran blocks Tor; Tor releases same-day fix | The Tor Blog
Iran looked at expiration times on SSL certs and the ones TOR uses were unusual. So they made them look normal, but if Iran is sufficiently motivated they can probably block TOR. Worse yet, they could try to DETECT the use of TOR.
security  tor  internet  anonyminity  via:HackerNews 
september 2011 by mcherm
Experimental Defense for Website Traffic Fingerprinting | The Tor Blog
Attackers can (barely) tell what site is visited with Tor by observing the pattern of packet sizes, timing, etc. Here is a defense Tor is testing.
security  tor  cryptography 
september 2011 by mcherm
WikiLeaks Was Launched With Documents Intercepted From Tor | Threat Level | Wired.com
Claims that WikiLeaks started out with a huge number of documents that had been sniffed off of Tor.
via:HackerNews  wikileaks  security  tor  wired 
june 2010 by mcherm

Copy this bookmark:





to read