[tor-talk] Wired Story on Uncovering Users of Hidden Services.

Anders Andersson pipatron at gmail.com
Thu Aug 14 09:06:30 UTC 2014


On Wed, Aug 13, 2014 at 11:56 PM, Aymeric Vitte <vitteaymeric at gmail.com> wrote:

>>   As
>> someone who argues against using javascript in any context, I can only
>> say "told you so", but that doesn't really help anyone. :)
>
> No and you are wrong

>From https://lists.torproject.org/pipermail/tor-announce/2013-August/000089.html
"An attack that exploits a Firefox vulnerability in JavaScript has
been observed in the wild."
People who didn't allow javascript were safe.


>> Because they managed to get in to the client browser, they could learn
>> the real IP address and MAC address
>
> and the color of your shirt

Why are you so defensive? Is it your code they broke? They could learn
the color of my shirt if the browser user has access to a webcam,
which is not uncommon. This is however highly irrelevant.


>> , they didn't learn this through
>> Tor.
>
> Are you serious in your answer?

Very much so. If you don't believe me, then maybe you'll believe these sources:

https://lists.torproject.org/pipermail/tor-announce/2013-August/000089.html
https://www.mozilla.org/security/announce/2013/mfsa2013-53.html

Nothing was exploited through Tor. In fact, they couldn't find out who
was using the server *because* people used Tor. So they had to resort
to javascript exploits.


More information about the tor-talk mailing list