Tor Forgets Evidence, Blames FBI & Carnegie Mellon for Hack


Susanne.Posel-Headline.News.Official- tor.carnegie.mellon.fbi.hack.2014.anonymous_occupycorporatismSusanne Posel,Chief Editor Occupy Corporatism | Co-Founder, Legacy Bio-Naturals
November 12, 2015

 

Tor Project (TP) is claiming that the corporation “has learned” more details about a 2014 attack they attribute to “Carnegie Mellon researchers on the hidden service subsystem.”

Last year, TP claimed that they “found a group of relays” that the corporation “assume were trying to deanonymmize users” of Tor. In a security advisory, the company also assumed that this hack was linked to the Black Hat conference, but did not provide an evidence of their theory.

Tor produced a talk wherein they explained their theory about a “persistent adversary” that attacked from “a handful of powerful servers” and “demonstrate” via a theoretical scenario how they believe the attack was orchestrated and whom they assume has carried it out.

Unfortunately, their summations were lacking in direct evidence and heavily relied on unconfirmed theories as to who was involved and what their motivation was.

In addition, Tor hypothesized about “a troubling precedent” set by their strawman argument, that resulted in “civil liberties [being] under attack if law enforcement believes it can circumvent the rules of evidence by outsourcing police work to universities.”

Tor has come up with a hypothesis – that the attackers were researchers from Carnegie Mellon who were paid by the Federal Bureau of Investigations (FBI) “to attack hidden services users in a broad sweep and then sift through their data to find people whom they could accuse of crimes.”

Keeping the mystery interesting, Roger Dingledine, director of TP, told the press , anonymous “friends in the security community” revealed to him Carnegie Mellon researchers were paid $1 million by the FBI in order to gather intelligence “to put away a member of the Silk Road 2.0 operation and a man charged with possession of child pornography.”

Interestingly, Tor “was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.”

Tor is able to maintain its reputation as a preserver of privacy because it “is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features.”

Tor is used to:

  • Keep websites from tracking visitors
  • Allow for connection to site blocked by internet service providers (ISPs)
  • Publish to the internet without divulging location
  • Maintain anonymity during “socially sensitive communication”
  • Provide journalists with communication routes with “whistleblowers and dissidents”
  • Facilitates non-governmental organizations (NGOs) ability to connect to their website while in foreign countries with complete anonymity
  • Stilled used by Naval Intelligence for data mining operations
  • Allows law enforcement to conduct internet surveillance “without leaving government IP addresses in their web logs, and for security during sting operations”

Tor clarifies: “Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor’s ability to put control over your security and privacy back into your hands.”





Source Article from http://feedproxy.google.com/~r/OccupyCorporatism/~3/QEqRjNaaRnY/

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes