601
Security / Re: NSA responsible for attack on freedom hosting
« on: August 06, 2013, 03:59 am »
What better way to make people aware that we disapprove of them than by shooting them and blowing them up?
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
I have been following the whole "FH was busted" line for a while now.
I find the following odd
#1) The first time this came up was a person who posted it to redit, linked to an article about a child porn distributor that was taken down in Ireland. (No mention of FH or TOR at all in the article)
#2) It has circulated for several days and has gotten bigger as it goes.
#3) The site has been up and down over the last couple of weeks, in various states of F-ed up.
#4) The Java exploit that was discussed was originally on a child porn site that was suspected of being on FH and not on the "Temporary down" page. It seems to have morphed over time.
#5) I have seen the temporary down page and it is flat HTML with no Iframes on it. The exploit was calmed to be in an iframe call.
The reason it smells off to me is that
#1) If the feds had taken down a child porn site on TOR or FH as a distributor, it would be news! They would blast that everywhere to scare potential TOR users away or make them think it is not as secure as it is.
#2) I have not seen any corroborating evidence that did not come from that first redit post. See #1!
I am not saying it is safe or that the person who runs FH did not get busted. I am saying that I would not be surprised if this was a hoax and the site had been hacked. The owner working to get it back up and not paying attention to the posts floating around.
BTW, tormail was up earlier today with the main page and the login page but when you tried to login it failed with a 404. There was No JS anywhere on the page, I checked.
I happened to be running the vulnerable browser with JS on and I clicked on a pedo link while exploring the hidden wiki on the 3rd. Should I expect a raid soon ? I'm not in located in the USA.
I've never had any illegal material on my PC, and I'm not a pedo, so they'll probably let me go after 24h, but being investigated for accessing pedo sites could completely ruin my life forever. It could destroy it.
Any idea how to prevent this or prepare for it ? Or maybe what to explain ?
hard to feel bad for you, dont click on pedo sites. Dot a pedo but look at the sites?
Since Tails is a Linux distribution and the JavaScript exploit was specific to Windows (it worked by making calls to the Windows API), you are safe. Even if it worked on Linux, Tails *may* have prevented it with its transparent proxying, unless the exploit also rooted your Tails instance, which would be considerably harder than what it was designed to do. Everyone who recently switched to Tails was safe, which turned out to be a great move in this community, considering how many people used Tormail.
I happened to be running the vulnerable browser with JS on and I clicked on a pedo link while exploring the hidden wiki on the 3rd. Should I expect a raid soon ? I'm not in located in the USA.
I've never had any illegal material on my PC, and I'm not a pedo, so they'll probably let me go after 24h, but being investigated for accessing pedo sites could completely ruin my life forever. It could destroy it.
Any idea how to prevent this or prepare for it ? Or maybe what to explain ?
Kmf,
A few days ago you were telling me that was not possible...?
They likely would still need a specific warrant for each account to see the contents of emails just like they would with any other email provider. I believe they need less to see the headers and subject but for the actual content they need to show probable cause to a judge to get access to the content. Assuming this is in the USA or some similar country.
Yeah and who exactly are they going to serve these warrants on? No one is going to own up to being the owner of Tormail are they?
Are we sure that the only way to be exposed to the exploit is visiting an FH website while running a non-recent version of firefox/Tor on a Windows computer?
That seems way too specific for me to believe it.
Unless people who look up CP all use the same setup. It sounds like theyre just trying to round up the low hanging fruit because all of this is easily avoidable with even a modicum of electronic security.
As the story is still breaking, here's the most updated info (which contradicts reports of NSA involvement):
There are incorrect press reports circulating that the command-and-control IP address, 65.222.202.54, belongs to the NSA. Those reports are based on a misreading of domain name resolution records. The NSA’s public website, NSA.gov, is served by the same upstream Verizon network as the Tor malware command-and-control server, but that network handles tons of government agencies and contractors in the Washington DC area.
source: http://www.wired.com/threatlevel/2013/08/freedom-hosting/
Although the Patriot Act gave the NSA some new and broad powers for domestic surveillance, this operation appears to be more criminal in nature than an issue of national security and thus outside of their jurisdiction. It's more than likely FBI.
And to those that would scoff about issues of jurisdiction in regards to NSA acts, consider what the exploits were hoping to accomplish. They were attempting to identify users involved in some seriously depraved criminality for the purpose of prosecution. The FBI, not the NSA, has authority in this regard.