I hate that all of the tech stuff flies over my head for the most part. Should I be worried if all I use is a thumb drive with Liberte? I had two tormail accounts that I had never used to send anything. Nor have I logged into them for many months. I never reused passwords but had a tormail matching my sr username.
I don't think Liberte users are vulnerable because it doesn't use Firefox or Iceweasel does it?
Is there any information on how he was tracked down and arrested?
No I don't think there is. I don't think there is even any proof yet that this is actually him, although circumstantial evidence strongly suggests that it is. I do know that he used virtual machines to isolate his web servers though, that means if he was hacked the hackers had to break out of a virtual machine, which is pretty advanced compared to everything we have thus far witnessed LE hackers do. Another possibility is that his server was traced to its entry guards and then LE got a court order to tap an identified entry guard in order to locate his hidden service. Another possibility is that he fucked up in some other way, maybe social engineering got him or maybe the datacenter his server was at noticed he had 24/7 terabytes a day of Tor traffic.
It APPEARS that anyone using a non-windows system has nothing to worry about. This includes tails and any other linux-based, or mac osx systems. The exploit has been reported to only work on the windows OS. While we cannot be sure this is the case, it does seem plausible. However, if the exploit does work on non-windows systems then using tails, etc. would likely not protect you from having your IP address discovered, as the IP provided by your ISP would be the same whether you use tails or not.
The exploit only targets what looks like Windows OS, but Tor Button makes all Tor users look like they are using Windows. So it is not certain that it wont work against Linux users, it will try to exploit them anyway due to the fact that Tor Button spoofs user agent to look like Windows. I have seen a few peoples opinions on this exploit code so far, and nobody is yet willing to say if it works against Linux or not. So far I have not heard much that sounds very solid.
I have done quite a bit of research on javascript and IP address discovery. There is no way that I have discovered to obtain your location's public IP address from javascript. All that (non-hacked) javascript has the capacity to do is report the private IP address of the local computer it is running on, which is useless to LE. Its clear that the FBI, or someone the FBI bought the exploit from (yes, the FBI buys shit off the black market too), has a way to do this.
Javascript directly cannot obtain IP address, but it can be used to take full remote control of a persons computer, because it can be used to exploit security vulnerabilities in firefox or whatever, and that is what people think has happened.
Was the Freedom Hosting owner even keeping his identity secret? I assume he didn't provide free hosting services. Perhaps he only allowed anonymous currency payments. Its not clear from any of the reports I've read. Its also not clear whether he was responsible for the child porn directly or his company hosted a hidden service that was responsible.
He kept his identity a secret and he did offer free hosting services.
Alright, so they got freedom hosting. The owner apparently had a history with child pornography. Illegal photographs were being hosted on freedom hosting's servers.. but they can't necessarily use that same tactic to shut SR down.. am I right? Yes, drugs are being sold here, but that doesn't give them any more than they already have to go after the company that hosts SR. Am I the only one who doesn't believe SR is next?
Of course they could use the same tactic to shut SR down.
Does anyone have any guess as to whether deleted messages on Tormail would be recoverable by an agency? Im thinking specifically ones that I deleted a year or so ago.
It may be possible, or it may not be, it depends on too many variables that we do not know. You should have used GPG.
I'm not entirely clear on what is/has happened here, are people saying the java script exploit was up and running before the FH sites went down or after?
The claim is that the exploit was injected during the down time, and during the time when the server is down message was coming up.
I think that FH was just allowing .onion sites to be hosted, I dont know if he directly was involved in CP or if it was just more of a "He allowed them to be hosted , Hes as guilty as the people downloading them"
He didn't host CP himself and he actually said in the rules that he wouldn't allow CP to be hosted, but he also turned a complete blind eye to it and obviously was fine with people using his server to host CP.
None concrete yet.
I am beginning to believe it was his own negligence that lead to his identification and arrest. He also ran a clearnet host (hostultra.com) and didn't seem too concerned about keeping his identity a secret (clearnet - http://www.webhostingtalk.com/showthread.php?t=157698). Freedom Hosting apparently had quite a lot in common with Host Ultra which, while circumstantial, could raise suspicion.
Also, Anonymous leaked specific software information about the Freedom Hosting server in fall of 2011. He was the wrong guy in their witch hunt but the information they collected I'm sure was filed by the FBI.
There is speculation of him running other deepweb services (I've read he ran OnionBank? any confirmations on that?) and there is also mention of large amounts of money running through his own bank account which is unlikely to be from Freedom Hosting as his plans were all unmetered. He could have been taking under-the-table payments to keep CP sites online above normal fees, and that would leave a paper trail if the client had been caught or was under investigation - or if a client that paid him under the table was actually law enforcement. There's also a bit of focus on a transaction to Romania (6000 euros) from his own bank account, which he claims is investment in another business. It's been mentioned in a couple of threads the possibility of "real life" social engineering.
It says the FBI has been investigating him for a year. He is also a US citizen, though living in Ireland since age 5 and the warrant is issued from Maryland.
Sorry I can't provide more info.
ER.
I don't think he was too stupid or anything, he had some of the best technical security of anyone in onionland and he has been running Freedom Hosting for quite a lot of years now with no issues. He also didn't charge anything for hosting anything. Also the person who is busted used his credit card to withdraw 6,000 Euro in romania but also sent about half a million dollars worth of Euros to Romania through his bank account.