[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.




Le 13/08/2014 23:01, Anders Andersson a écrit :
Considering the number of individuals that must have visited the hidden
service, this doesn't seem to be very many people. Why were so few
identified? Were the 25 using outdated browsers (TBB)?

How, in this case, was it possible for the FBI to learn the IP addresses of
visitors to this hidden service? The Tor hidden server page states that "In
general, the complete connection between client and hidden service consists
of 6 relays: 3 of them were picked by the client with the third being the
rendezvous point and the other 3 were picked by the hidden service."

Can someone knowledgeable please explain how visitors to a Tor hidden
service can have their real IPs detected?
AFAIK the malware used javascript to break the users' browsers.

No kidding, js can break browsers now...

  As
someone who argues against using javascript in any context, I can only
say "told you so", but that doesn't really help anyone. :)

No and you are wrong

Because they managed to get in to the client browser, they could learn
the real IP address and MAC address

and the color of your shirt

, they didn't learn this through
Tor.

Are you serious in your answer?

--
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms

--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk