Se estan cargando muchas cosas que no son ilegales... nos quieren dominar.
como ya suponiamos algunos...
era una vulnerabilidad que al intentar acceder a una pagina de la red tor te pillaba tu hostname y tu mac
aqui la descripcion del ataque
https://lists.torproject.org/piperma...st/000089.html
The vulnerability allows arbitrary code execution, so an attacker
could in principle take over the victim's computer. However, the
observed version of the attack appears to collect the hostname and MAC
address of the victim computer, send that to a remote webserver over
a non-Tor connection, and then crash or exit [8]
alguno de los comentarios:
domaintools.com shows the exploiter's server IP (65.222.202.53) belongs to the government contractor SAIC. They do work with NSA but also many other government agencies (source: I used to work for them!). The link in that article to the robtex.com page (pop.robtex.com/nsa.gov.html#records) doesn't seem to include that IP. So I can't see how they know it's been "assigned" to NSA. But that it's linked to SAIC means it likely is some kind of U.S. government project.You have to assume that all emails on Tormail are now in the hands of LEA. It could have been the primary target and all the sloppy CP bust exploit could be just a coverup. If that's the case, it worked perfectly. Nobody talks about Tormail - the real issue here, but everyone talks about a few busted pedos.
'Busted the biggest hoster of CP on the planet?" Bullshit, FH didn't host much, the biggest onion CP hosting site is still up and running and most of the CP allegedly hosted on FH were just links to files hosted on clearnet hosts, such as rapidshare, sendspace, mega.. these are the biggest CP hosters in the world.
What they really bust is Tormail, used by whistle blowers and activists. That's the real story here! They want to get to those who are anti government and pro people, like wiki-leaks supporters. Taking down a few CP sites that only had links and have already been partially restored on safe servers, is just a media attention catcher.TorMail is an interesting issue here. The almost certain fact is that existing accounts are in the hands of FBI. Also, AFAIK, TorMail is an enterprise not related to FreedomHosting, they merely rented a server there. So technically, TorMail could resume as soon as they find a new service provider. They could continue under the name of TorMail, or they could use any other name, in order to not be associated with the compromised old accounts. Now, FBI could launch their own little TorMail. Or FBI could start their own anonymous mail service under a different name.
Whatever. The crucial point is that we will have no way to tell which is true. In fact, I don't think that we even need to worry about that - when one uses someone else's service without seeing where it hides its brain, one should always assume that all his actions may be monitored by some hostile agent. TorMail could have been hostile, bribed, or hacked. Same about FH. Or, no matter how good were the intentions of TorMail and Freedom Hosting, there was always a chance that somebody would accidentally stumble upon the servers and read everyone's correspondence. Or knock the server owner against his head and then read everyone's correspondence.
So if (or rather, when) TorMail or something similar returns, we won't really know whether it's FBI or the original thing (unless they give back your old account, in which case it can only be FBI). But it doesn't really matter. As long as you stay in character, you can as well use the feds' servers for your shadowy actions. If you let your real-world id slip, you are doomed either way.
Update: Researchers say Tor-targeted malware phoned home to NSA | Ars Technica
Should Microsoft Help NSA Exploit Vulnerabilities? | Jason Volpe's Blog
como google y apple han ido creando un mapa del mundo con todas las macs que han ido interceptando a traves de wifis, servicios de google, smartphones, etc... pues todos los que hemos usado el torweb con esa vulnerabilidad estamos en su lista y con una señal en un mapa indicando nuestra casa
Alternativas para navegar libremente (ligeramente algo mas libres quiero decir):
https://prism-break.org/#es
Última edición por Usuario470071016; 08/08/2013 a las 02:47
hace unos dias me cree un correo en tormail pq estoy harto de google y de todas las empresas que nos espian y al dia siguiente no funcionaba y yo si que tenia esa vulnerabilidad
ya me parecia muy extraño que intentaba entrar y se me cerro el navegador
A otro hilo.El mensaje está oculto porque el usuario está en tu lista de ignorados.
hamijo, la mac del router no la de la tarjeta de redEl mensaje está oculto porque el usuario está en tu lista de ignorados.
Alternativas para intentar navegar libremente:
https://prism-break.org/#es
Última edición por Usuario470071016; 08/08/2013 a las 02:59
invoco a @Caos
@Therion me interesa bastante el tema. Podrías traducir parte de tu post para los que no somos tan aventajados en ingles podamos comprenderlo mejor? Gracias
Os dejo también un par de artículos que tal vez os interesen
Un informático en el lado del mal: ¿Cómo ser anónimo en Internet? La red TOR bajo sospecha
Un informático en el lado del mal: Bloqueo de conexiones autenticadas desde la red TOR