Delivery-Date: Fri, 07 Nov 2014 10:17:27 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 329ED1E0ACE;
	Fri,  7 Nov 2014 10:17:26 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 6A3AD3131B;
	Fri,  7 Nov 2014 15:17:22 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 1D90D30F17
 for <tor-talk@lists.torproject.org>; Fri,  7 Nov 2014 15:17:18 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id qLAvecPgSe-m for <tor-talk@lists.torproject.org>;
 Fri,  7 Nov 2014 15:17:18 +0000 (UTC)
Received: from atl4mhob09.myregisteredsite.com
 (atl4mhob09.myregisteredsite.com [209.17.115.47])
 by eugeni.torproject.org (Postfix) with ESMTP id DE6692F61A
 for <tor-talk@lists.torproject.org>; Fri,  7 Nov 2014 15:17:17 +0000 (UTC)
Received: from mailpod.hostingplatform.com ([10.30.71.207])
 by atl4mhob09.myregisteredsite.com (8.14.4/8.14.4) with ESMTP id
 sA7FHDP4013234
 for <tor-talk@lists.torproject.org>; Fri, 7 Nov 2014 10:17:13 -0500
Received: (qmail 9901 invoked by uid 0); 7 Nov 2014 15:17:13 -0000
X-TCPREMOTEIP: 162.17.205.153
X-Authenticated-UID: datzrott@alizeepathology.com
Received: from unknown (HELO ALPATH26)
 (datzrott@alizeepathology.com@162.17.205.153)
 by 0 with ESMTPA; 7 Nov 2014 15:17:12 -0000
From: "Derric Atzrott" <datzrott@alizeepathology.com>
To: <tor-talk@lists.torproject.org>
References: <20141106180756.42a2541d@meilong> <20141107150403.29f9e51e@meilong>
In-Reply-To: <20141107150403.29f9e51e@meilong>
Date: Fri, 7 Nov 2014 10:17:12 -0500
Organization: Alizee Pathology LLC.
Message-ID: <006501cffa9d$e8380a70$b8a81f50$@alizeepathology.com>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQIFNFJm1A+n5V+QTmw0615JvV9ZmQHh0dkfm9u3o8A=
Content-Language: en-gb
Subject: Re: [tor-talk] Operation Onymous against hidden services,
	most DarkNet markets are down
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

> "The BBC understands that the raid represented both a technological
> breakthrough - with police using new techniques to track down the
> physical location of dark net servers - as well as seeing an
> unprecedented level of international co-operation among law enforcement
> agencies."
>
> http://www.bbc.co.uk/news/technology-29950946
>
> There you have it: An admission that Yes, they really can locate the
> Tor hidden services now and Yes, that is how they shut these sites down.
>
> I look forward to the cointelpro shills trying to explain that
> statement away. Go!

Could be BBC misunderstanding things.  That does happen pretty regularly.

Of course, I'm not saying that someone hasn't broken Tor Hidden Services,
it would be an awful idea to categorically rule that out, but so far we
haven't seen any real evidence of it.  I just read through the arrest
warrant request for Benthall and didn't see anything in that besides
Benthall being stupid and the police being clever.

We'll have to wait for the charging documents to come out for those that
just got arrested to see how police allege to have found their hidden
services.  While parallel construction is certainly a possibility, and
one that I wouldn't rule out, I don't think it is likely.  And if they
are using parallel construction then what do you suggest that we do?
Without an understanding of how hidden services may be broken, there
is not much that can be done to fix the issue.

My recommendation, don't do stupid or illegal things using Tor or if
you do do them, make sure that your op-sec is top notch.  It only takes
one mistake to have your cover blown.  Law enforcement, particularly
US Law enforcement is a greater adversary than I think that most Tor
users will ever face being that they have absurd amounts of funding
and the time to do targeted attacks.

Thank you,
Derric Atzrott

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

