![]() ![]() ![]() We know because we tested it, in the wild." In a summary of the talk on the conference website, the researchers claimed that it was possible to “de-anonymize hundreds of thousands of Tor clients and thousands of hidden services within a couple of months,” and that they would discuss examples of their own work identifying "suspected child pornographers and drug dealers." ![]() In fact the indictment made it sound easy, saying the FBI "identified the server located in a foreign country," and that law enforcement went in and imaged it sometime around May 30, 2014.Īround that same time, two researchers from Carnegie Mellon, Alexander Volynkin and Michael McCord, were preparing for a presentation at hacker conference Black Hat about work they'd done to easily "break Tor." They were vague about the details but promised that their work wasn't just theoretical: "Looking for an IP address for a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. But the indictment is vague about how exactly the FBI got its hands on the supposedly hidden server Silk Road 2.0 was using. One of the helpful volunteers Benthall allegedly tapped to help moderate the underground drug marketplace was an undercover Homeland Security agent (who was paid over $30,000 in Bitcoin for his or her efforts). ![]() (As in, no longer "Anonymous.") In the Benthall indictment, the FBI revealed that part of its investigation was good-old fashioned undercover police work. ![]()
0 Comments
Leave a Reply. |