![]() |
50% of all Tor sites busted (due to Bitcoin) and FBI spyware injected
Half of all Tor ("darknet" or "deep web" .onion) sites busted, as one guy used bitcoin.
And FBI injected a spyware in all sites to get real IP of surfers. The "freedom hosting" hosted all these, including "tormail", a gmail-like service, popular with drug sellers of "Silk Road". How the hosting guy was identified? In forums they say it is bitcoin to blame: the guy had setup an "onion bank" on 16 July, and he got busted in a week or two. Bitcoin is pseudonymous, not anonymous. If police send a bitcoin to X, then just have to follow it in blockchain: X sends to Y, then to Z... at some point the guy cashed Z into dollars, and he's identified. This is why money exchangers are busted themselves, unless keeping an ID of each user, they must know the customer same as a bank or a payoneer or paxum. So when the police asks for ID of bitcoin user X, they get it. http://www.techweekeurope.co.uk/news...ibution-123789 http://arstechnica.com/tech-policy/2...-distribution/ What's cool from FBI/NSA (more probably, from their Snowden-like consultants): after the bust, they run the sites for a few days, inserting a javascript exploit in all the pages, that sent the real IP and MAC address to police servers, to identify the Tor surfers, at least those on windows with a firefox version prior to 20 June. The feds had run busted sites before as a trap, but the "inject malware" thing is a step forward which solved the proxy limits: http://www.theverge.com/2013/5/29/43...ting-operation Actually bitcoin, tor and all technologies it seems the best friend of government and police. It was harder to bust criminals when they used only cash and handwritten paper pieces. |
I guess franck must be doing time.
|
Where are now all bitcoin from there?
|
uh oh... I should not purchased all that afghan heroin.... Sorry!
|
oh lol, bitcoin to save the world! what an stupid hoax to scare people :upsidedow
|
itsatrap.jpg
|
Quote:
http://bitcoinity.org/markets/image?span=7d&size=medium I would not expect a mass sale of bitcoins now, more likely an hold of them. People who got paid in bitcoins for drugs or illegal sites, should be afraid to sell bitcoins. The bitcoin addresses of most these people is know by feds (is enough to buy a drug or tip a site, and follow the laundering steps in blockchain, there's even premade software for follow that forever). Then if any will exchange with mtgox, bitinstant or such, the feds can request ID's filed by those exchangers for that guy. Really who use bitcoin for illegal stuff does not use mtgox or bitinstant, but instead https://localbitcoins.com/ which let you find people to trade with directly. So person to person, safe even if using banks, given bank and bitcoin is connected via word of mouth deals and not a centralized exchange. But, let's go in Silk Road forums, you see the following instructions given for safe bitcoins trading: 1. Go to localbitcoins.com using TorBrowser or Tails. 2. Create an account, giving them a tormail.org email address. ... Not so wise advice to use a third party server for mails. Tormail server been seized, and feds reading mails now, including nice discussions for drug deals and shipping addresses, to use as evidence later. I bet the feds will have to hire extra staff to look at all those logs they got lately. |
With a little bit of luck they got some of the people posting their illegal porn on forums who use lumfile.com.
|
Quote:
(CP = clown porn) |
Tor is still going strong. It was mainly some hidden services which were busted. The malware was only an issue on certain configurations and where the user had Javascript enabled.
|
Quote:
|
I think illegal porn was the bigger issue than bitcoins.
|
if this was so easy, then why not stop all torrent sites ? by uploading malware... and fucking torrent downloaders.
|
Quote:
|
If they were illegally trading in CP -- too bad -- you reap what you sow in life. |
No problem, new antivirus versions will block the government malware(s):
http://www.sci-tech-today.com/news/F...d=012001C8QW90 CIPAV (computer and Internet Protocol address verifier), a tool meant to analyze anonymous Web traffic Relevant Products/Services, has allowed the FBI and other law enforcement agencies to gather information and then determine who was accessing specific Web sites. Since this is the first time that researches have been able to see what appears to be the CIPAV code itself, anti-virus programs may be able to provide updates that block the code from infecting computers in the future. |
so the fbi used their technology to nab some pieces of shit?
i say congrats. |
Quote:
Also it really wasn't effective for most. Most Tor users have javascript disabled so it never got installed. |
So much stupidity... so little desire to address it.
|
I guess its whose agenda it suits - The UK press is saying CP etc...
|
so if fbi have something useful for tor, they just publish it so next udpates on antiviruses will fill the hole and they can start again from zero? ok then ... :upsidedow
|
Quote:
By the way FBI had recently made an Android malware too: http://thehackernews.com/2013/08/And...-backdoor.html http://thecyberinfo.com/2013/08/05/f...investigation/ There they say the government got a whole division working at doing malwares: http://www.nbcnews.com/technology/fb...say-6C10851882 And they was blaming the Chinese government for being hackers :) |
All times are GMT -7. The time now is 07:09 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123