Silk Road forums
Discussion => Security => Topic started by: nobodyenduser on September 28, 2013, 03:25 am
-
I know it was targeted toward severs that hosted child pornography and those motherfuckers deserve to get caught and buttfucked nightly in prison by bubba and his friends but from what I've read the malware affected many users of the TBB and not just the assholes.
Does anyone know how to find if they have been infected by locating certain files and the best way of cleaning if infected.
-
welcome to two months ago. Also glad to see you included your mandatory "I am not a pedophile" disclaimer.
-
They only got the owner of Freedom Hosting, not the creators of the pedo websites.
Meanwhile they also silently got Tormail, which is never mentioned, so it is now in the hands of the NSA. That's only a total coincidence of course, the NSA has totally nothing to do with it.
The malware didn't infect anyone with anything. The only residue is a cookie in the browser.
-
welcome to two months ago. Also glad to see you included your mandatory "I am not a pedophile" disclaimer.
Lol. +1
Love your dry, sarcastic replies. :)
-
welcome to two months ago. Also glad to see you included your mandatory "I am not a pedophile" disclaimer.
Was going to call you an asshole but even I laughed at that one.
-
I know it was targeted toward severs that hosted child pornography and those motherfuckers deserve to get caught and buttfucked nightly in prison by bubba and his friends but from what I've read the malware affected many users of the TBB and not just the assholes.
Does anyone know how to find if they have been infected by locating certain files and the best way of cleaning if infected.
OK. Pedophilia does not mean that you molest children. It can mean that, but it generally means you get off on watching kiddie porn (God I'm embarrassed to explain this and feel the need to also include an obligatory 'I'm not a pedophile' disclaimer too), which wasn't illegal in the US until the 1980s (not illegal to possess I should say).
Anywho, all they did was take down Freedom Hosting's servers. When they say it affected TBB users, they meant that other non-porn sites (like fucking tormail for example) were taken down because they were hosted by those servers. As far as I know, none of that was done using malware targeted at individual TBB users, but I wouldn't take my word for it.
Just don't download PDFs or Word files or anything like that from unknown sources. And give Linux a go. It's not 100% secure, but most malware is written for Windows. There is a tiny bit for Mac and even less for Linux.
Oh, and regarding Java, you should have Java disabled in all of your browsers unless you specifically need to run a Java applet (which almost no one needs to do now). If you need to use it, keep a separate browser for Java related tasks
PS I'm NOT talking about java script if that's what you meant.
-
welcome to two months ago. Also glad to see you included your mandatory "I am not a pedophile" disclaimer.
+1
trolling at its finest.
-
welcome to two months ago. Also glad to see you included your mandatory "I am not a pedophile" disclaimer.
+1
trolling at its finest.
No I was being dead serious actually. This shit was news two months ago. And I am glad he included the mandatory disclaimer or else everybody would think he is a pedophile. Sometimes I even spontaneously say "I am not a pedophile" just to let people know. If you don't say it every so often people start to wonder.
-
Regardless of the fucktard who started the thread, there's a valid unanswered question here I think.
How did they find FH? Tor fan boys usually say that it was thanks to some kind of exploit on FH servers, not Tor, but I don't think they have any proof for that. It's more like wishful thinking.
-
Regardless of the fucktard who started the thread, there's a valid unanswered question here I think.
How did they find FH? Tor fan boys usually say that it was thanks to some kind of exploit on FH servers, not Tor, but I don't think they have any proof for that. It's more like wishful thinking.
Form Wired:
It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors.
They gained access to the servers and started serving up custom malware to "unmask" tor users. So yes, there was an exploit in their servers. But they are (or were) distributing malware that sends the real IP address.
The rest of the article is here if you want to read more (Clearnet):
http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/
-
those motherfuckers deserve to get caught and buttfucked nightly in prison by bubba and his friends
Methinks thou doth protest too much ;)
-
They gained access to the servers and started serving up custom malware to "unmask" tor users. So yes, there was an exploit in their servers.
Everybody knows that at some point they gained access to the servers, but that's not how they found the servers.
Looks like you didn't even read your own article.
"It’s not clear how the FBI took over the servers in late July,"
-
Regardless of the fucktard who started the thread, there's a valid unanswered question here I think.
Fucktard? That's what your mom said last night. Oops.. I mean she said fuck me hard, fuck me hard not fucktard, my mistake.
bitFOOL? sure enough the name says it all, now shut the fuck up before I slap the taste out your mouth.
-
They gained access to the servers and started serving up custom malware to "unmask" tor users. So yes, there was an exploit in their servers.
Everybody knows that at some point they gained access to the servers, but that's not how they found the servers.
Looks like you didn't even read your own article.
"It’s not clear how the FBI took over the servers in late July,"
To be honest, I did not read the article beyond what I quoted. That's why I linked the article itself rather than paraphrasing it. There were a milion other articles when I googled it.
Also, no one seems to be taking this seriously. Personally I don't care. (well, I don't support the US government distributing malware, but I'm also sure it's not hardly a new thing).
Look, the reason I'm never on these forums is because I spend most of my free time searching for ways to beef up security,stay ahead of LE, and vulnerabilities in both TOR (and Linux too in my case). I assumed everyone else did the same.
-
Regardless of the fucktard who started the thread, there's a valid unanswered question here I think.
Fucktard? That's what your mom said last night. Oops.. I mean she said fuck me hard, fuck me hard not fucktard, my mistake.
bitFOOL? sure enough the name says it all, now shut the fuck up before I slap the taste out your mouth.
LMFAO! +1 for fucktard = fuck hard! That made me laugh!
-
To be honest, I did not read the article beyond what I quoted.
.
Right. You don't have a clue.
-
To be honest, I did not read the article beyond what I quoted.
.
Right. You don't have a clue.
Right. I don't give a flying fuck about it, nor did anyone else who answered. You want to know? Do your own fucking research. Do you mean to say that you actually trust the "experts" on this forum for your security? Good luck with that!
-
I know it was targeted toward severs that hosted child pornography and those motherfuckers deserve to get caught and buttfucked nightly in prison by bubba and his friends but from what I've read the malware affected many users of the TBB and not just the assholes.
Does anyone know how to find if they have been infected by locating certain files and the best way of cleaning if infected.
I think you misunderstood what was happening. To the best of my understanding what happened was that the FBI planted a malicious application on certain servers (hosted by Freedom Hosting), at least some of which were believed to contain child pornography. The net effect of this application was to 'phone home' as it were, outside of Tor, and report on certain properties of the user's computer, including the computer name and IP address. In order for this to happen 4 things needed to occur:
1) The ostensible victim had to be running a Windows computer. Given that the payload was designed to affect Windows machines, people running other OSes were unaffected.
2) The victim had to be running a vulnerable version of the Tor Browser Bundle (TBB) or otherwise be running a vulnerable version ot both Tor and Firefox.
3) The victim had to fail to disable Java/Javascript.
4) The victim had to be trying to access one of the systems booby-trapped by the FBI during the period when the exploits were running.
What you appear to be thinking of is a 'traditional' malware infection, where a site leaves something nasty on your system. This is not the case here. There is nothing to clean up, as the malicious app would only have run on a vulnerable system during the time when you tried to access a booby-trapped system.
Finally, as much as you may despise the pedos, I wouldn't be rooting for the FBI, if I were you. Remember, the same methods that can be used against THEM can also be used against US.
It is a trusim that: either EVERYONE is safe or NO ONE is safe.
Nightcrawler
4096R/BBF7433B 2012-09-22 Nightcrawler <Nightcrawler@SR>
PGP Key: http://dkn255hz262ypmii.onion/index.php?topic=174.msg633090#msg633090 (Silk Road Forums PGP Key Link)
PGP Key Fingerprint = 83F8 CAF8 7B73 C3C7 8D07 B66B AFC8 CE71 D9AF D2F0