CHATPRIVACYDONATELOGINREGISTER
DMT-Nexus
FAQWIKIHEALTH & SAFETYARTATTITUDEACTIVE TOPICS
Tor Sites Compromised Options
 
corpus callosum
#1 Posted : 8/4/2013 9:41:02 PM

DMT-Nexus member

Medical DoctorModerator

Posts: 1952
Joined: 17-Apr-2010
Last visit: 05-May-2024
Location: somewhere west of here


http://www.twitlonger.com/show/n_1rlo0uu

What do you guys/girls make of this?
I am paranoid of my brain. It thinks all the time, even when I'm asleep. My thoughts assail me. Murderous lechers they are. Thought is the assassin of thought. Like a man stabbing himself with one hand while the other hand tries to stop the blade. Like an explosion that destroys the detonator. I am paranoid of my brain. It makes me unsettled and ill at ease. Makes me chase my tail, freezes my eyes and shuts me down. Watches me. Eats my head. It destroys me.

 

Live plants. Sustainable, ethically sourced, native American owned.
 
Red Eclipse
#2 Posted : 8/4/2013 10:00:45 PM
DMT-Nexus member


Posts: 176
Joined: 23-Jun-2010
Last visit: 01-Sep-2024
https://blog.torproject....ents-and-freedom-hosting

Quote:
From what is known so far, the breach was used to configure the server in a way that it injects some sort of javascript exploit in the web pages delivered to users. This exploit is used to load a malware payload to infect user's computers. The malware payload could be trying to exploit potential bugs in Firefox 17 ESR, on which our Tor Browser is based. We're investigating these bugs and will fix
them if we can.



A possible way to link FH's hosted sites (deepweb) to the clearnet? If this is the case then you could find IP addresses, possibly? I don't know but this seems plausible.
 
Nathanial.Dread
#3 Posted : 8/5/2013 1:46:06 AM

DMT-Nexus member


Posts: 2151
Joined: 23-Nov-2012
Last visit: 07-Mar-2017
I've been thinking about this a lot today, and I am seriously conflicted.

On one-hand, I do love the Tor network for the anonymity and freedom it gives (for example, even though I don't buy from them myself, I am fully in support of the folks over at The Silk Road). However, I accept that freedom from the reach of the law also means that it will inevitably attract unsavory and downright evil people to it.

I am not in favor of destroying the whole network because some of it's users give it a bad name, however. That's the US government's reaction to everything ("it may be dangerous? Kill it with fire!"Pleased and we know it never works.

Blessings
~ND
"There are many paths up the same mountain."

 
Mr.Peabody
#4 Posted : 8/5/2013 5:11:48 AM

DMT-Nexus member


Posts: 1310
Joined: 27-Sep-2012
Last visit: 01-Feb-2022
Location: Lost in space
I've used Tor for a while now. I often wondered if it may actually highlight a user, as it is clear they want to avoid being noticed, thus making the user stick out.

What might this mean, as far as the link goes? I am still skeptical as to whether what you post to the net is grounds for a warrant. I doubt it would hold up, but I know they could employ other more underhanded ways of bringing a person in. They important thing to remember, is the time, resources, and money are after the distributors. It's where the big PR, and promotions are.

Honestly, I think a site like the Nexus, with such a strict "no distributing" policy would be far down on the list to get screwed with. At least, that's my hope. And at least, for the moment, I don't think they would or could go after people for simply viewing other sites which are less cautious.

I guess I always assumed that they could figure out where a Tor user was, anyway. Man I love the state of our government....
Be an adult only when necessary.
 
Nathanial.Dread
#5 Posted : 8/5/2013 6:39:28 AM

DMT-Nexus member


Posts: 2151
Joined: 23-Nov-2012
Last visit: 07-Mar-2017
I'm pretty sure The Nexus is safe on Free Speech grounds.
We don't actually get up to anything explicitly illegal here (no distribution, no sourcing, etc).
Everything else is sketchy, but pretty purely hypothetical. If an individual were prosecuted, activity on The Nexus would be a huge part of their conviction, but being a member is not illegal in and of itself.

Blessings
~ND
"There are many paths up the same mountain."

 
armbarsalot
#6 Posted : 8/5/2013 12:48:57 PM

DMT-Nexus member


Posts: 69
Joined: 08-Jul-2013
Last visit: 01-May-2014
Location: Middle Earth
You've got to go a step beyond tor if you want to be anon. Buy the netbook or what ever on craigslist, never login to personal accounts or wifi & use public access points or prepaid wifi cards with cash.
"Keep your friends close but your elbows closer." Unknown
 
Red Eclipse
#7 Posted : 8/5/2013 9:53:59 PM
DMT-Nexus member


Posts: 176
Joined: 23-Jun-2010
Last visit: 01-Sep-2024
An update to yesterday's discovered exploit. Apparently, only versions of the tor browser downloaded before June 26 were exploited. It also seems that only users on Windows OS were open for exploit (Linux, OSX, and liveCD users were not vulnerable):




https://lists.torproject.../2013-August/000089.html

Quote:
SUMMARY:
This is a critical security announcement.

An attack that exploits a Firefox vulnerability in JavaScript
has been observed in the wild. Specifically, Windows users using the
Tor Browser Bundle (which includes Firefox plus privacy patches)
appear to have been targeted.

This vulnerability was fixed in Firefox 17.0.7 ESR. The following
versions of the Tor Browser Bundle include this fixed version:
2.3.25-10 (released June 26 2013)
2.4.15-alpha-1 (released June 26 2013)
2.4.15-beta-1 (released July 8 2013)
3.0alpha2 (released June 30 2013)

Tor Browser Bundle users should ensure they're running a recent enough
bundle version, and consider taking further security precautions as
described below.

WHO IS AFFECTED:
In principle, all users of all Tor Browser Bundles earlier than
the above versions are vulnerable. But in practice, it appears that
only Windows users with vulnerable Firefox versions were actually
exploitable by this attack.

To be clear, while the Firefox vulnerability is cross-platform, the
attack code is Windows-specific. It appears that TBB users on Linux
and OS X, as well as users of LiveCD systems like Tails, were not
exploited by this attack.


IMPACT:
The vulnerability allows arbitrary code execution, so an attacker
could in principle take over the victim's computer. However, the
observed version of the attack appears to collect the hostname and MAC
address of the victim computer, send that to a remote webserver over
a non-Tor connection
, and then crash or exit. The attack appears
to have been injected into (or by) various Tor hidden services,
and it's reasonable to conclude that the attacker now has a list of
vulnerable Tor users who visited those hidden services.

We don't currently believe that the attack modifies anything on the
victim computer.

WHAT TO DO:
First, be sure you're running a recent enough Tor Browser Bundle. That
should keep you safe from this attack.

Second, be sure to keep up-to-date in the future. Tor Browser Bundle
automatically checks whether it's out of date, and notifies you on its
homepage when you need to upgrade. Recent versions also add a flashing
exclamation point over the Tor onion icon. We also post about new
versions on the Tor blog: https://blog.torproject.org/

Third, realize that this wasn't the first Firefox vulnerability, nor
will it be the last. Consider disabling JavaScript (click the blue
"S" beside the green onion, and select "Forbid Scripts Globally"Pleased.
Disabling JavaScript will reduce your vulnerability to other attacks
like this one, but disabling JavaScript will make some websites not work
like you expect. A future version of Tor Browser Bundle will have an
easier interface for letting you configure your JavaScript settings.
You might also like Request Policy. And you might want to randomize
your MAC address, install various firewalls, etc.

Fourth, consider switching to a "live system" approach like Tails.
Really, switching away from Windows is probably a good security move
for many reasons.

And finally, be aware that many other vectors remain for vulnerabilities
in Firefox. JavaScript is one big vector for attack, but many other
big vectors exist, like css, svg, xml, the renderer, etc. We need
help improving usability of (and doing more security analysis of)
better sandboxing approaches as well as VM-based approaches like
Whonix and WiNoN.



 
 
Users browsing this forum
Guest

DMT-Nexus theme created by The Traveler
This page was generated in 0.053 seconds.