GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   50% of all Tor sites busted (due to Bitcoin) and FBI spyware injected (https://gfy.com/showthread.php?t=1117596)

adultmobile 08-06-2013 07:22 AM

50% of all Tor sites busted (due to Bitcoin) and FBI spyware injected
 
Half of all Tor ("darknet" or "deep web" .onion) sites busted, as one guy used bitcoin.
And FBI injected a spyware in all sites to get real IP of surfers.

The "freedom hosting" hosted all these, including "tormail", a gmail-like service, popular with drug sellers of "Silk Road". How the hosting guy was identified? In forums they say it is bitcoin to blame: the guy had setup an "onion bank" on 16 July, and he got busted in a week or two.

Bitcoin is pseudonymous, not anonymous. If police send a bitcoin to X, then just have to follow it in blockchain: X sends to Y, then to Z... at some point the guy cashed Z into dollars, and he's identified. This is why money exchangers are busted themselves, unless keeping an ID of each user, they must know the customer same as a bank or a payoneer or paxum. So when the police asks for ID of bitcoin user X, they get it.

http://www.techweekeurope.co.uk/news...ibution-123789

http://arstechnica.com/tech-policy/2...-distribution/

What's cool from FBI/NSA (more probably, from their Snowden-like consultants): after the bust, they run the sites for a few days, inserting a javascript exploit in all the pages, that sent the real IP and MAC address to police servers, to identify the Tor surfers, at least those on windows with a firefox version prior to 20 June.

The feds had run busted sites before as a trap, but the "inject malware" thing is a step forward which solved the proxy limits:

http://www.theverge.com/2013/5/29/43...ting-operation

Actually bitcoin, tor and all technologies it seems the best friend of government and police. It was harder to bust criminals when they used only cash and handwritten paper pieces.

Captain Kawaii 08-06-2013 07:28 AM

I guess franck must be doing time.

seeandsee 08-06-2013 07:28 AM

Where are now all bitcoin from there?

Choopa_Pardo 08-06-2013 07:37 AM

uh oh... I should not purchased all that afghan heroin.... Sorry!

lucas131 08-06-2013 07:49 AM

oh lol, bitcoin to save the world! what an stupid hoax to scare people :upsidedow

arock10 08-06-2013 08:07 AM

itsatrap.jpg

adultmobile 08-06-2013 08:45 AM

Quote:

Originally Posted by seeandsee (Post 19748269)
Where are now all bitcoin from there?

In this very moment, bitcoin +4%

http://bitcoinity.org/markets/image?span=7d&size=medium

I would not expect a mass sale of bitcoins now, more likely an hold of them. People who got paid in bitcoins for drugs or illegal sites, should be afraid to sell bitcoins. The bitcoin addresses of most these people is know by feds (is enough to buy a drug or tip a site, and follow the laundering steps in blockchain, there's even premade software for follow that forever). Then if any will exchange with mtgox, bitinstant or such, the feds can request ID's filed by those exchangers for that guy.

Really who use bitcoin for illegal stuff does not use mtgox or bitinstant, but instead https://localbitcoins.com/ which let you find people to trade with directly. So person to person, safe even if using banks, given bank and bitcoin is connected via word of mouth deals and not a centralized exchange. But, let's go in Silk Road forums, you see the following instructions given for safe bitcoins trading:

1. Go to localbitcoins.com using TorBrowser or Tails.
2. Create an account, giving them a tormail.org email address.
...

Not so wise advice to use a third party server for mails. Tormail server been seized, and feds reading mails now, including nice discussions for drug deals and shipping addresses, to use as evidence later. I bet the feds will have to hire extra staff to look at all those logs they got lately.

AdultKing 08-06-2013 08:55 AM

With a little bit of luck they got some of the people posting their illegal porn on forums who use lumfile.com.

DWB 08-06-2013 08:58 AM

Quote:

Originally Posted by Captain Kawaii (Post 19748268)
I guess franck must be doing time.

Really DWB, haven't we had this discussion before? Last warning dude!
















(CP = clown porn)

signupdamnit 08-06-2013 09:19 AM

Tor is still going strong. It was mainly some hidden services which were busted. The malware was only an issue on certain configurations and where the user had Javascript enabled.

lucas131 08-06-2013 09:44 AM

Quote:

Originally Posted by signupdamnit (Post 19748410)
Tor is still going strong. It was mainly some hidden services which were busted. The malware was only an issue on certain configurations and where the user had Javascript enabled.

yeah, if you dont know how to be safe, go back to facebook, no program will save your ass :)

Wizzo 08-06-2013 09:49 AM

I think illegal porn was the bigger issue than bitcoins.

freecartoonporn 08-06-2013 11:00 AM

if this was so easy, then why not stop all torrent sites ? by uploading malware... and fucking torrent downloaders.

lucas131 08-06-2013 11:14 AM

Quote:

Originally Posted by freecartoonporn (Post 19748569)
if this was so easy, then why not stop all torrent sites ? by uploading malware... and fucking torrent downloaders.

because it is not that easy, because the bust was cause of something else, and this is just a lie for public :winkwink:

Barry-xlovecam 08-06-2013 12:23 PM

If they were illegally trading in CP -- too bad -- you reap what you sow in life.

adultmobile 08-06-2013 03:40 PM

No problem, new antivirus versions will block the government malware(s):

http://www.sci-tech-today.com/news/F...d=012001C8QW90

CIPAV (computer and Internet Protocol address verifier), a tool meant to analyze anonymous Web traffic Relevant Products/Services, has allowed the FBI and other law enforcement agencies to gather information and then determine who was accessing specific Web sites.
Since this is the first time that researches have been able to see what appears to be the CIPAV code itself, anti-virus programs may be able to provide updates that block the code from infecting computers in the future.

Phoenix 08-06-2013 04:30 PM

so the fbi used their technology to nab some pieces of shit?

i say congrats.

signupdamnit 08-06-2013 04:35 PM

Quote:

Originally Posted by freecartoonporn (Post 19748569)
if this was so easy, then why not stop all torrent sites ? by uploading malware... and fucking torrent downloaders.

Because it was the government doing it. They have free reign while we would likely be arrested for spreading malware. The companies don't dare do that either because they would be sued by users for the cost of the damage to their computers.

Also it really wasn't effective for most. Most Tor users have javascript disabled so it never got installed.

- Jesus Christ - 08-06-2013 04:40 PM

So much stupidity... so little desire to address it.

EddyTheDog 08-06-2013 04:41 PM

I guess its whose agenda it suits - The UK press is saying CP etc...

lucas131 08-06-2013 05:34 PM

so if fbi have something useful for tor, they just publish it so next udpates on antiviruses will fill the hole and they can start again from zero? ok then ... :upsidedow

adultmobile 08-06-2013 07:35 PM

Quote:

Originally Posted by lucas131 (Post 19749186)
so if fbi have something useful for tor, they just publish it so next udpates on antiviruses will fill the hole and they can start again from zero? ok then ... :upsidedow

The firefox bug they used it was already fixed a month ago so it made sense to use it as soon as possible, as more people would have updated firefox (Tor browser).

By the way FBI had recently made an Android malware too:

http://thehackernews.com/2013/08/And...-backdoor.html

http://thecyberinfo.com/2013/08/05/f...investigation/

There they say the government got a whole division working at doing malwares:

http://www.nbcnews.com/technology/fb...say-6C10851882

And they was blaming the Chinese government for being hackers :)


All times are GMT -7. The time now is 07:09 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123