1
Anonymous
@soapbox
31 Oct 2011 12:34AM
• 962 views • 0 attachments

For those of you who asked for ''one example of tor being broken.'' Guess what I've got :). Google Robert Mikelsons, theres your ''1 example'' that involved 11 of these so called hiddensites. The feds became admin's of your favorite shit and they was watching.

reply favorite add to gallery permalink Share
Quote Strike
Anonymous
Anonymous
note, attachments may take a moment to show up.

Replies 7

1
Anonymous
31 Oct 2011 12:54AM

The only information the admins would have would be the usernames and the spoof IP number.

reply permalink parent Share
Quote Strike
Anonymous
Anonymous
note, attachments may take a moment to show up.
1
Anonymous
31 Oct 2011 2:50AM

it isnt a spoof its the ''real'' ip of one of your nodes

reply permalink parent Share
Quote Strike
Anonymous
Anonymous
note, attachments may take a moment to show up.
1
Anonymous
31 Oct 2011 1:16PM

Yes but the nodes are not connected to you as a tor user except by the ip address of the other node you came from, and the nodes change frequently.

For tor to be useless there would have to be some mechanism for lea to become the entry node consistently, but tor randomizes that just because of the danger of it.

The biggest flaw is that tor doesnt support encrypted traffic and thus the exit nodes can steal passwords and data, but the exit nodes have no access to your ip.

You do have to be careful not to transmit any INFORMATION over tor that can be connected to you by other means, your name, address, or identifying information. And have all scripting stuff turned off, java, etc

reply permalink parent Share
Quote Strike
Anonymous
Anonymous
note, attachments may take a moment to show up.
1
Anonymous
31 Oct 2011 1:25PM

I've been able to establish 3 nodes on Tor at our IT department, modify the config and patch the code so it doesn't encrypt. Not difficult to get the frst node to log the IP of your machine and have the destination also log the IP as it is chained along. Tor sees these as corrupted nodes but it works and it works well.

reply permalink parent Share
Quote Strike
Anonymous
Anonymous
note, attachments may take a moment to show up.
1
Anonymous
31 Oct 2011 4:08PM

^^A person going into TOR is no secret to anyone, you just don't know where they are going, if you intercept people at this moment you can do what the fuck you like to them; divert them, put a tracer on them ect.

reply permalink parent Share
Quote Strike
Anonymous
Anonymous
note, attachments may take a moment to show up.
1
Anonymous
13 Jan 2012 12:34AM

use peer block. everytime i use tor it blocks about 50 attempts to access info on my ip.

reply permalink parent Share
Quote Strike
Anonymous
Anonymous
note, attachments may take a moment to show up.
1
Anonymous
13 Jan 2012 8:43PM

Nowhere in any article I can find does it say they broke Tor. Admittedly it's not 100% clear, but it sounds much more like they hacked one or more of the hidden sites through Tor. This shouldn't be terribly surprising, since Tor isn't designed to provide any protection against that. Anonymous did the same thing another time.

reply permalink parent Share
Quote Strike
Anonymous
Anonymous
note, attachments may take a moment to show up.