Author

Topic: [2016-02-25] FBI And Carnegie Mellon University Attacked Tor (Read 326 times)

legendary
Activity: 1904
Merit: 1074
Nobody knows if exit nodes are compromised or not, or how many nodes are run by them. They could also have used man-in-the-middle attacks or compromised ISP's.

It is common knowledge that some router manufacturers were infiltrated on the hardware level. { For example Cisco } There are many weak points and if you do not

update your Tor browser or you use it in the wrong way, you are vulnerable to infiltration.  Roll Eyes
member
Activity: 78
Merit: 10
Ever since Silk Road 2.0 was shut down by law enforcement, there has been one particular shred of evidence which has been a point of debate. Some people were fairly certain the FBI would not have been able to arrest Brian “DoctorClu” Farrell if law enforcement did not breach the Tor protocol. As it turns out, this is exactly what happened, and Carnegie Mellon University helped the FBI attack the Tor protocol to put Farrell under surveillance. This news puts an end to the mystery, but what does it mean for Bitcoin and Tor in the future?

http://www.newsbtc.com/2016/02/25/fbi-and-carnegie-mellon-university-attacked-tor-to-unmask-silk-road-2-0-operator/
Jump to: