[tor-talk] Wired Story on Uncovering Users of Hidden Services.

Aymeric Vitte vitteaymeric at gmail.com
Wed Aug 13 21:56:05 UTC 2014


Le 13/08/2014 23:01, Anders Andersson a écrit :
>> Considering the number of individuals that must have visited the hidden
>> service, this doesn't seem to be very many people. Why were so few
>> identified? Were the 25 using outdated browsers (TBB)?
>>
>> How, in this case, was it possible for the FBI to learn the IP addresses of
>> visitors to this hidden service? The Tor hidden server page states that "In
>> general, the complete connection between client and hidden service consists
>> of 6 relays: 3 of them were picked by the client with the third being the
>> rendezvous point and the other 3 were picked by the hidden service."
>>
>> Can someone knowledgeable please explain how visitors to a Tor hidden
>> service can have their real IPs detected?
> AFAIK the malware used javascript to break the users' browsers.

No kidding, js can break browsers now...

>   As
> someone who argues against using javascript in any context, I can only
> say "told you so", but that doesn't really help anyone. :)

No and you are wrong

> Because they managed to get in to the client browser, they could learn
> the real IP address and MAC address

and the color of your shirt

> , they didn't learn this through
> Tor.

Are you serious in your answer?

-- 
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms



More information about the tor-talk mailing list