MESSAGE
DATE | 2015-06-18 |
FROM | Elfen Magix
|
SUBJECT | Re: [NYLXS - HANGOUT] Tor security
|
That is their mistake. Tor's security works when you have multiple sites to land on, this was a single site they landed on and got traced back. The tracing is simple. And worst they probably did not use proxies along the way, making it much more easier to trace back to them. If this was a hacker, then this was a poor snob of 2600 magazine reading script kiddie and not a true hacker.
~Fernando
--------------------------------------------
On Thu, 6/18/15, Ruben Safir wrote:
Subject: [NYLXS - HANGOUT] Tor security
To: "Hangout"
Date: Thursday, June 18, 2015, 1:34 AM
Anyone understand this? How can they unravel tor and
what messages
STORE the route paths aside from email?
Baseball
Hacking Inquiry Finds a Trail Despite Efforts to
Cover It Up
By JAMES GLANZ
JUNE
17, 2015
Continue reading the main story
Share This Page
The F.B.I.’s route to the St. Louis Cardinals
’
front office in pursuit of an apparent hacker, or hackers,
involved a
trip through a shrouded corner of the Internet.
The website Deadspin pointed out last June
that internal documents from the Houston Astros had been
posted
anonymously on a site called Anonbin. Alarmed, the Major
League Baseball
commissioner’s office notified law enforcement officials.
From the
Anonbin posting, those officials worked backward to find
the
perpetrator, who had tried to leave no tracks.
The person or people who penetrated the Astros’ network
apparently used
a network of servers called Tor to hide the source of the
documents that
found their way to the site.
Continue reading the main story
Related Coverage
*
Jeff Luhnow, the Houston Astros’ general
manager, with Jon Jay,
left, and Daniel Descalso of the Cardinals in
2013.
Cardinals Investigated for
Hacking Into Astros’ DatabaseJUNE 16,
2015
*
General Manager John Mozeliak on Tuesday. It
is unknown how much the
Cardinals would have benefited from a
hacking.
On Baseball: If Cardinals
Hacked, Their Gamesmanship Crossed the
LineJUNE 16, 2015
*
Jon Jay and Allen Craig are among the
Cardinals drafted during Jeff
Luhnow's tenure in the St. Louis front office.
Both players were
instrumental during the Cardinals' 2011
championship run.
Of All Teams to Hack, Why the
Astros?JUNE 16, 2015
*
Belichick, Snowden and Hack
Wilson: Twitter Reacts to Cardinals
ScandalJUNE 16, 2015
“Tor is among the best anonymizing services out there, but
it is not a
silver bullet,” said Sascha Meinrath, director of X-Lab, a
technology
policy organization in Washington. Tor is most effective in
the hands of
an experienced hacker, Mr. Meinrath said. The hacking,
though, seems to
have left traces somewhere in the welter of Tor servers.
“What this tells me is that whoever leaked this is not
very tech savvy,”
he said.
The Tor network functions as a sort of Internet maze to
throw off anyone
who tries to trace the origin of an electronic message, Mr.
Meinrath
said. When the network receives a message, it bounces from
server to
server. The ordinary Internet pastes a series of addresses
onto a
message, allowing it to be traced back to the sender. In
contrast, the
Tor network strips that information out.
When the message emerges from the network, the source is, in
theory,
untraceable. Even so, it has long been known that
intelligence and law
enforcement agencies have made extensive efforts to
infiltrate the Tor
network and trace those who use it.
Many of the servers on the Tor network are run by
volunteers. Mr.
Meinrath said that if the F.B.I. explored the network, it
was possible
that investigators were not able to infiltrate enough
servers on their
own to trace the origin of the documents.
“Probably the F.B.I. had some of that information but not
all of it,”
Mr. Meinrath said.
Another possibility, he said, was that the volunteer was not
operating a
server properly and kept information about the routes taken
by the
messages passing through it.
A skilled hacker, Mr. Meinrath said, would take into account
all of
these possibilities and add one or two additional layers of
security to
the communication — for example, using software to cloak
the identity of
the computer that sent the message and connecting to the
Internet
somewhere that could not be linked to its source. Those
measures seem to
have eluded those who did the hacking.
|
|