[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.
On Wed, Sep 10, 2014 at 12:26:03AM -0400, Griffin Boyce wrote:
> Kyle Maxwell wrote:
> >Griffin Boyce wrote:
> >>Actually, no, I *am* surprised that they decided to not even
> >>bother trying to gift malware to Mac or Linux users.
> >
> >Probably just playing the odds, I'd suspect. Though they could've
> >examined the access logs at some point - do we know either way on that?
>
> Hey Kyle,
>
> With Freedom Hosting, I actually don't know. It seems like few technical
> details have come out of that case. However, I *do* know that they'd been
> hacked at various points, and the service had very poor security overall.
> The restrictions in place did not actually prevent php files from creating
> *other* types of scripts... Their sandboxing was reputedly quite bad, and
> for years they had no restrictions on resources that users could utilize.
> So creating an app designed to expand to occupy all resources on the server
> until it crashed was highly effective. The server itself may not even have
> kept access logs. It's unclear.
>
> With SilkRoad[2], supposedly investigators imaged the entire drive, so
> this should still be possible. In any case, I think it's important to avoid
> taking the investigators' statements at face value. Weev mentioned that
> investigators made dubious technical statements in some places, and while I
> haven't read all of the documents to come out about this case, that's
> certainly within the realm of possibility.
>
> There are likely still details that haven't come out yet about both cases
> (though I can't know for sure) and it's not entirely clear what level of
> technical expertise various people have.
>
> Things that are important to note for hidden service operators:
> - Firewall rules are really useful for keeping out unwarranted scrutiny.
> - Don't hardcode your IP address in any links (though this is one of the
> least-likely theories).
> - Having a pseudonym isn't a replacement for excellent security practices.
> - Don't run a hidden service host.
> - For best security, run your own services rather than relying on someone
> else's security. I feel like this is often overlooked in the name of
> "easiness" but it's really important IMO. [1]
Is it does not contradict with previous statement about "don't run a
hidden service host"?
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk