{"id":9487,"date":"2015-11-12T17:38:40","date_gmt":"2015-11-12T23:38:40","guid":{"rendered":"http:\/\/hcstx.org\/?p=9487"},"modified":"2015-11-12T17:38:40","modified_gmt":"2015-11-12T23:38:40","slug":"tor-browser-compromised-by-feds","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/11\/12\/tor-browser-compromised-by-feds\/","title":{"rendered":"TOR Browser Compromised by Feds?"},"content":{"rendered":"<p>Say it ain&#8217;t so!<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-9488\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/11\/tor.jpg?w=620\" alt=\"Digital Composite Image Geometric Shapes\" width=\"620\" height=\"430\" \/><\/p>\n<p><span class=\"lede\">EVER SINCE A <\/span>Carnegie Mellon talk on cracking the anonymity software Tor was abruptly <a href=\"https:\/\/www.blackhat.com\/latestintel\/07212014-a-schedule-update.html\" target=\"_blank\" rel=\"noopener\">pulled from the schedule of the Black Hat hacker conference last year<\/a>, the security community has been left to wonder whether the research was silently handed over to law enforcement agencies seeking to uncloak the internet\u2019s anonymous users. Now the non-profit Tor Project itself says that it believes the FBI did use Carnegie Mellon\u2019s attack technique\u2014and paid them handsomely for the privilege.<\/p>\n<p>The Tor Project on Wednesday afternoon sent WIRED a statement from its director Roger Dingledine directly accusing Carnegie Mellon of providing its Tor-breaking research in secret to the FBI in exchange for a payment of \u201cat least $1 million.\u201d You can now read the full <a href=\"https:\/\/blog.torproject.org\/blog\/did-fbi-pay-university-attack-tor-users\" target=\"_blank\" rel=\"noopener\">statement on the Tor Project\u2019s blog<\/a>.<sup>1<\/sup> And while Carnegie Mellon\u2019s attack had been rumored to have been used in takedowns of dark web drug markets that used Tor\u2019s \u201chidden service\u201d features to obscure their servers and administrators, Dingledine writes that the researchers\u2019 dragnet was larger, affecting innocent users, too.<\/p>\n<p>\u201cApparently these researchers were paid by the FBI to attack hidden services users in a broad sweep, and then sift through their data to find people whom they could accuse of crimes,\u201d Dingledine writes. \u201cSuch action is a violation of our trust and basic guidelines for ethical research. We strongly support independent research on our software and network, but this attack crosses the crucial line between research and endangering innocent users.\u201d<\/p>\n<p>Read the Remainder at<strong> <a href=\"http:\/\/www.wired.com\/2015\/11\/tor-says-feds-paid-carnegie-mellon-1m-to-help-unmask-users\/?mbid=nl_111215\">Wired<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Say it ain&#8217;t so! EVER SINCE A Carnegie Mellon talk on cracking the anonymity software Tor was abruptly pulled from the schedule of the Black Hat hacker conference last year, the security community has been left to wonder whether the research was silently handed over to law enforcement agencies seeking to uncloak the internet\u2019s anonymous&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2122,74,1317,883,1814,65],"tags":[2956,2957,2958,1859,1805],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/9487"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=9487"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/9487\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=9487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=9487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=9487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}