[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon Nov 10 18:00:05 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/45 ===
===========================================================================

version 5
Author: harmony
Date:   2014-11-10T17:25:47+00:00

   start writing about onymous

--- version 4
+++ version 5
@@ -12,12 +12,51 @@
 Welcome to the forty-fifth issue in 2014 of Tor Weekly News, the weekly
 newsletter that covers what’s happening in the XXX Tor community.
 
-Feature XXX
------------
+Tor and Operation Onymous
+-------------------------
 
-Feature 1 with cited source [XXX]
+An international coalition of law enforcement authorities
+announced [XXX] the seizure of over 400 Tor hidden services allegedly
+engaging in illegal activity. Once the desired headlines had been
+written, something approaching the facts began to emerge, with the
+claimed number of seized services dropping sharply to 27 [XXX]; more
+troublingly, several high-capacity Tor relays with no connection to the
+hidden services were also seized [XXX, XXX]. However, in contrast to the
+last major takedown of hidden services [XXX], which was probably
+attributable to carelessness by the operators of a shared hidden service
+hosting platform, there was no obvious single feature linking all of the
+seized sites, leading to concern in the Tor community that an exploit
+against the Tor network may have been responsible for their discovery.
 
- [XXX]:
+It could be that these services were deanonymized individually over a
+period of months using a variety of means, then all seized at once for
+maximum effect: as Andrew Lewman and others wrote in a response posted
+to the Tor blog [XXX], these methods could include operational security
+mistakes by service operators, exploitation of flaws in poorly-written
+website code, or attacks on the Bitcoin cryptocurrency that is widely
+used on hidden service marketplaces. On the other hand, if an attack on
+the Tor network itself is at play, it may be a variant of the class of
+attack known as “traffic confirmation”, like the one observed earlier
+this year [XXX]. “Unfortunately,” as the blog post notes, ”the
+authorities did not specify how they managed to locate the hidden
+services”; even if they had, recent disclosures concerning “parallel
+construction” in law enforcement [XXX] mean that the public would not
+necessarily be able to trust their explanation.
+
+“Hidden services need some love” has become a familiar refrain in recent
+months, and even though the story behind these seizures may remain
+unknown, they have reinvigorated some long-running discussions of
+possible improvements to the security of this important technology.
+
+[XXX will continue]
+
+ [XXX]: https://www.europol.europa.eu/content/global-action-against-dark-markets-tor-network
+ [XXX]: http://www.dailydot.com/politics/oops-we-counted-wrong-silk-road-dark-net-tor/
+ [XXX]: https://blog.torservers.net/20141109/three-servers-offline-likely-seized.html
+ [XXX]: https://raided4tor.wordpress.com/
+ [XXX]: https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous
+ [XXX]: https://lists.torproject.org/pipermail/tor-news/2014-August/000057.html
+ [XXX]: https://en.wikipedia.org/wiki/Parallel_construction
 
 Monthly status reports for XXX month 2014
 -----------------------------------------



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list