Jump to content

Invite Scene - #1 to Buy, Sell, Trade or Find Free Torrent Invites

#1 TorrentInvites Community. Buy, Sell, Trade or Find Free Torrent Invites for Every Private Torrent Trackers. HDB, BTN, AOM, DB9, PTP, RED, MTV, EXIGO, FL, IPT, TVBZ, AB, BIB, TIK, EMP, FSC, GGN, KG, MTTP, TL, TTG, 32P, AHD, CHD, CG, OPS, TT, WIHD, BHD, U2 etc.

LOOKING FOR HIGH QUALITY SEEDBOX? EVOSEEDBOX.COM PROVIDES YOU BLAZING FAST & HIGH END SEEDBOXES | STARTING AT $5.00/MONTH!

FBI Is Infecting Tor Users With Malware To Catch Kiddie Porn Creeps


Recommended Posts

Tor’s had a tough week. Just a few days ago, the organisation made the difficult announcement that an attack on its system likely stripped users of anonymity. Now, Wired reports that the FBI effort has been running a campaign to identify Tor users by installing malware on their computers for years, virtually unchecked by the courts.
 
The report comes from Wired‘s hacker-in-residence Kevin Poulsen, a former black hat hacker who understands these issues from both sides of the fence. On one hand, it’s hard to argue with what the FBI is doing. The so-called “network investigative techniques†that the bureau uses to gain backdoor access to computer users files, location, and web history is indisputably malware. And it’s pretty creepy too at that, since it trains high-traffic websites to deliver the malware to large swaths of users in what security researchers call a “drive-by download.â€
 
However, the FBI has so far used the technique to find the demented people who peddle child pornography on the Deep Web. Poulsen reports that “over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result†of the approach. Presumably, these sickos would otherwise still be taking advantage of children, if the FBI’s malware hadn’t intervened. To the agency’s credit, they have owned up to these techniques in the past.
 
Like many things cyber security-related, however, there’s plenty of mystery involved in exactly how this stuff works. One chief and pretty well-justified concern is that the malware is also targeting innocent Tor users. “You could easily imagine them using this same technology on everyone who visits a jihadi forum, for example,†the ACLU’s Chris Soghoian told Wired. “And there are lots of legitimate reasons for someone to visit a jihadi forum: research, journalism, lawyers defending a case.â€
 
It’s unclear whether innocent users are caught in the crossfire, but the FBI is expected to continue using these drive-by download tools for the foreseeable future. Since they don’t have to detail exactly what they’re in court filings, the fact that they’re basically hacking into unsuspecting Americans’ computers is going unnoticed by the judges. Whether you think you might be a target or you’re just interested in learning more about the FBI’s sort of sketchy cybercrime methods, read the full report at Wired.
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Check out what our members are saying

  • Our picks

×
×
  • Create New...