MESSAGE
DATE | 2015-09-09 |
FROM | Ruben Safir
|
SUBJECT | Re: [NYLXS - HANGOUT] Tor security
|
On 06/18/2015 01:13 PM, Elfen Magix wrote: > That is their mistake. Tor's security works when you have multiple sites to land on, this was a single site they landed on and got traced back. The tracing is simple. And worst they probably did not use proxies along the way, making it much more easier to trace back to them. If this was a hacker, then this was a poor snob of 2600 magazine reading script kiddie and not a true hacker. > > ~Fernando
are you ok?
> > -------------------------------------------- > On Thu, 6/18/15, Ruben Safir wrote: > > Subject: [NYLXS - HANGOUT] Tor security > To: "Hangout" > Date: Thursday, June 18, 2015, 1:34 AM > > > > Anyone understand this? How can they unravel tor and > what messages > STORE the route paths aside from email? > > Baseball > > > Hacking Inquiry Finds a Trail Despite Efforts to > Cover It Up > > By JAMES GLANZ > JUNE > 17, 2015 > > Continue reading the main story > > Share This Page > > The F.B.I.’s route to the St. Louis Cardinals > ’ > front office in pursuit of an apparent hacker, or hackers, > involved a > trip through a shrouded corner of the Internet. > > The website Deadspin pointed out last June > > that internal documents from the Houston Astros had been > posted > anonymously on a site called Anonbin. Alarmed, the Major > League Baseball > commissioner’s office notified law enforcement officials. > From the > Anonbin posting, those officials worked backward to find > the > perpetrator, who had tried to leave no tracks. > > The person or people who penetrated the Astros’ network > apparently used > a network of servers called Tor to hide the source of the > documents that > found their way to the site. > > Continue reading the main story > > > > > Related Coverage > > * > Jeff Luhnow, the Houston Astros’ general > manager, with Jon Jay, > left, and Daniel Descalso of the Cardinals in > 2013. > > > Cardinals Investigated for > Hacking Into Astros’ DatabaseJUNE 16, > 2015 > > > > > * > General Manager John Mozeliak on Tuesday. It > is unknown how much the > Cardinals would have benefited from a > hacking. > > > On Baseball: If Cardinals > Hacked, Their Gamesmanship Crossed the > LineJUNE 16, 2015 > > > > > * > Jon Jay and Allen Craig are among the > Cardinals drafted during Jeff > Luhnow's tenure in the St. Louis front office. > Both players were > instrumental during the Cardinals' 2011 > championship run. > > > Of All Teams to Hack, Why the > Astros?JUNE 16, 2015 > > > > > * > > > Belichick, Snowden and Hack > Wilson: Twitter Reacts to Cardinals > ScandalJUNE 16, 2015 > > > > > “Tor is among the best anonymizing services out there, but > it is not a > silver bullet,” said Sascha Meinrath, director of X-Lab, a > technology > policy organization in Washington. Tor is most effective in > the hands of > an experienced hacker, Mr. Meinrath said. The hacking, > though, seems to > have left traces somewhere in the welter of Tor servers. > > “What this tells me is that whoever leaked this is not > very tech savvy,” > he said. > > The Tor network functions as a sort of Internet maze to > throw off anyone > who tries to trace the origin of an electronic message, Mr. > Meinrath > said. When the network receives a message, it bounces from > server to > server. The ordinary Internet pastes a series of addresses > onto a > message, allowing it to be traced back to the sender. In > contrast, the > Tor network strips that information out. > > When the message emerges from the network, the source is, in > theory, > untraceable. Even so, it has long been known that > intelligence and law > enforcement agencies have made extensive efforts to > infiltrate the Tor > network and trace those who use it. > > Many of the servers on the Tor network are run by > volunteers. Mr. > Meinrath said that if the F.B.I. explored the network, it > was possible > that investigators were not able to infiltrate enough > servers on their > own to trace the origin of the documents. > > “Probably the F.B.I. had some of that information but not > all of it,” > Mr. Meinrath said. > > Another possibility, he said, was that the volunteer was not > operating a > server properly and kept information about the routes taken > by the > messages passing through it. > > A skilled hacker, Mr. Meinrath said, would take into account > all of > these possibilities and add one or two additional layers of > security to > the communication — for example, using software to cloak > the identity of > the computer that sent the message and connecting to the > Internet > somewhere that could not be linked to its source. Those > measures seem to > have eluded those who did the hacking. > > >
|
|