Govt Dismissing Darknet Cases due to State Secrets, Illegal Actions, Etc
juan
juan.g71 at gmail.com
Wed Jan 11 11:10:11 PST 2017
On Wed, 11 Jan 2017 11:59:19 -0500
Steve Kinney <admin at pilobilus.net> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
>
> On 01/10/2017 08:49 PM, juan wrote:
> > On Tue, 10 Jan 2017 20:30:34 -0500 grarpamp <grarpamp at gmail.com>
> > wrote:
> >
> >> https://www.eff.org/deeplinks/2016/09/playpen-story-fbis-unprecedente
> d-and-illegal-hacking-operation
> >
> >>
> > unprecedented? except for freedom hosting? what the fuck?
> >
> > anyway, another great illustration showing what piece of shit the
> > tor network is - wouldn't expect less from a cyberweapon whose
> > purpose is to serve the pentagon.
>
> I think the Big Secrets they are trying to protect here include:
>
> * The technique the FBI used to ID their child porn customers only
> works if the customer is running the TOR Browser on a Microsoft OS
> with NoScript in its default "off" position. The more widely this is
> publicized, the more useless the FBI's anti-TOR kit becomes.
That was a vulnerable configuration when the 'hidden'
service freedom hosting was 'unhidden' by the gov't, in 2013.
One would expect that the browser side of things was patched
after that...
Anyway, piece-of-shit tor has two points of failure. First the
target server is found through traffic analysis (not
'hacked'). Once they know where the server is, the gov't calls
the datacenter and tells them to patch the site so that it now
serves malware. And the malware 'compromises' the shitty tor
browser.
>
> * The FBI distributed real child porn for weeks, in an operation not
> seeking to prosecute the people who produce it, and not doing anything
> to help the victims. How much of the great unwashed public would
> approve of that? Better toss out a red herring or two, make another
> issue the big talking point.
Well, that's the basic magical power of the state. They can
criminalize non criminal activity like file transfers, and they
can also exempt themselves from their own arbitrary 'laws'.
>
> * And yeah, "nobody" wants the general public to understand that the
> TOR Browser Bundle is not ten feet tall and bullet proof, so the means
> of exploiting it to find a user's IP address has to appear to be a
> secret Superpower, not a script kiddie stunt.
They must be using a 'new' 'undisclosed' hole in the shitty java
script engine, or more perhaps more likely, in another library
of the amazing and 'open' (no bugs eh) piece of bloatware known
as firefox.
On the other hand, the malware was allegedly served to
thousands of machines. One would expect that somebody somehow
saved a copy...Especially somebody interested in doing "quality
assurance" of the the tor shitbundle.
>
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.22 (GNU/Linux)
>
> iQEcBAEBAgAGBQJYdmRnAAoJEECU6c5XzmuqpC8IAJihtjh1eyOUEsw3F0dHfLoo
> cgir1wGB/id/IgUNkyGVR3jwPNrD4Kz6lcWXioZyLXXjyKuBgLnl3b/D7dVQWliv
> P51rHzxI8z3c4bS/4kHVZZSWE+hAowd37x+v5AMyqlulG2If4s5spLbnKdQoEqkM
> dl2xFMjixrD8g/268bNGNxk5LNk+5JPKeYHohxpZG1dkz3xuiY4JQzmbgVEWvwWD
> UWz613aIWvM0jiRX13+ts0wLG0AuOG3CcT6qTWvZ3vynAYOtnqhP8EgYH/rhDLT3
> EQawpo7aIrWv7dGPZd947p9T3Ijmu6ijocQdME2aWF+PI6Un0h+BAjpFGwz0dK8=
> =fYSk
> -----END PGP SIGNATURE-----
More information about the cypherpunks
mailing list