[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKLh_qxk8eWBigUthSTLnvD1h0SWqT_vjnzFxLxKx3ZC-gLdYA@mail.gmail.com>
Date: Wed, 23 Jul 2014 09:50:52 +1000
From: "Ivan .Heca" <ivanhec@...il.com>
To: Rikairchy <blakcshadow@...il.com>
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] Peeling the onion: Almost everyone involved in developing
Tor was (or is) funded by the US government | PandoDaily
A presentation on a low-budget method to unmask users of a popular online
privacy tool, TOR, will no longer go ahead at the Black Hat security
conference early next month.
http://www.pcworld.com/article/2456700/black-hat-presentation-on-tor-suddenly-cancelled.html
On 19/07/2014 9:09 AM, "Rikairchy" <blakcshadow@...il.com> wrote:
To my knowledge, TOR could easily be subverted. If you attack all your
known exit nodes, you can force your own nodes to have a higher priority
due to the relativity low traffic compared to those under attack. You could
then tag unencrypted packets and follow them back to the initiating
computer.
This scenario was proposed to me when I first started using TOR, and I was
under the impression that Anonymous had done something similar when they
exposed a number of illegal websites
On Jul 17, 2014 7:28 PM, "Stephen Crane" <culda.rinon@...il.com> wrote:
> Tor was originally sponsored by the US Naval Research Lab. Does this
> automatically mean it's backdoored then? Could someone insert a backdoor
> into open-source software? Yes. Funding sources do little to change this.
> Now, who is controlling exit nodes is a different story, but that's
another
> can of worms.
>
>
> On Wed, Jul 16, 2014 at 5:10 PM, Ivan .Heca <ivanhec@...il.com> wrote:
>
> > Funding doubled, so engineering some back doors?
> >
> > In 2012, Tor nearly doubled its budget, taking in $2.2 million from
> > Pentagon and intel-connected grants: $876,099 came from the DoD,
$353,000
> > from the State Department, $387,800 from IBB.
> >
> > That same year, Tor lined up an unknown amount funding from the
> > Broadcasting Board of Governors to finance fast exit nodes.
> >
> > http://pando.com/2014/07/16/tor-spooks/
> >
> > _______________________________________________
> > Sent through the Full Disclosure mailing list
> > http://nmap.org/mailman/listinfo/fulldisclosure
> > Web Archives & RSS: http://seclists.org/fulldisclosure/
> >
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> http://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/
>
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists