Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

"It's a dog-eat-dog world out there, and I'm wearing Milkbone underware." -- Norm, from _Cheers_


computers / alt.privacy / 4 Types of Attacks on the Tor Network to De-anonymize Tor Users

SubjectAuthor
* 4 Types of Attacks on the Tor Network to De-anonymize Tor UsersLogram
`* Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor UsersStainless Steel Rat
 `* Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor UsersThe Running Man
  `* Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor UsersD
   `* Re: Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor UsersThe Running Man
    `- Re: Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor UsersD

1
4 Types of Attacks on the Tor Network to De-anonymize Tor Users

<afaa58d81349c714fcdeff7279d957b3@dizum.com>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=536&group=alt.privacy#536

  copy link   Newsgroups: alt.comp.os.windows-11 alt.privacy alt.privacy.anon-server comp.os.linux.advocacy
From: logram@nowhere.org (Logram)
Subject: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users
Message-ID: <afaa58d81349c714fcdeff7279d957b3@dizum.com>
Date: Wed, 6 Mar 2024 10:50:14 +0100 (CET)
Newsgroups: alt.comp.os.windows-11, alt.privacy, alt.privacy.anon-server,
comp.os.linux.advocacy
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Logram - Wed, 6 Mar 2024 09:50 UTC

https://www.linkedin.com/pulse/4-types-attacks-tor-network-de-anonymize-
users-arun-kl

Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users

<20240306141256.BE8BE1200A9@fleegle.mixmin.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=537&group=alt.privacy#537

  copy link   Newsgroups: alt.comp.os.windows-11 alt.privacy alt.privacy.anon-server comp.os.linux.advocacy
Subject: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users
References: <afaa58d81349c714fcdeff7279d957b3@dizum.com>
Message-Id: <20240306141256.BE8BE1200A9@fleegle.mixmin.net>
Date: Wed, 6 Mar 2024 14:12:56 +0000 (GMT)
Newsgroups: alt.comp.os.windows-11, alt.privacy, alt.privacy.anon-server,
comp.os.linux.advocacy
Author-Supplied-Address: ssr<AT>nym<DOT>mixmin<DOT>net
From: Use-Author-Supplied-Address-Header@[127.1] (Stainless Steel Rat)
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Stainless Steel Rat - Wed, 6 Mar 2024 14:12 UTC

On Wed, 6 Mar 2024 10:50:14 +0100 (CET), Logram <logram@nowhere.org> said:

> https://www.linkedin.com/pulse/4-types-attacks-tor-network-de-anonymize-users-arun-kl

Is It Possible To De-Anonymize a Tor User?
To conclude the answer to this question. De-anonymizing Tor users aren’t
just theoretical. The governments have caught many Tor users and detained
them for illegal activities. One such example is silk road an online dark
website hosted in 2011 by Ross Ulbricht to trade illegal drugs. According
to Edward Snowden, it is never possible to de-anonymize all Tor users at
once. But, with manual analysis, it is possible to de-anonymize a very
small fraction of Tor users. Till now, no success has been seen in
de-anonymizing a user based on the request or demand.

Bringing up Ross Ulbricht is a red-herring. Ulbricht was found due to his
use of a Gmail account in his own name: rossulbricht@gmail.com. This account
was linked to an nym he used (altoid) to advertise Silk Road early on.

The majority of illicit market operators and vendors have been busted using
similar methods -- another case in point:

Feds say alleged AlphaBay operator Alexandre Cazes welcomed users
to the dark web drug market with a message that included the email
address "Pimp_Alex_91@hotmail.com."

https://www.vice.com/en/article/zmv535/alleged-dark-web-kingpin-doxed-himself-with-his-personal-hotmail-address

Stainless Steel Rat

Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users

<YTXfWwlk6OM7s/kj9uuhgs/JyaDzgN6KiSJuedtXHIc=@writeable.com>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=539&group=alt.privacy#539

  copy link   Newsgroups: alt.privacy
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: runningman@writeable.com (The Running Man)
Newsgroups: alt.privacy
Subject: Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users
Date: Wed, 6 Mar 2024 21:56:51 -0000 (UTC)
Organization: EasyNews
Lines: 37
Message-ID: <YTXfWwlk6OM7s/kj9uuhgs/JyaDzgN6KiSJuedtXHIc=@writeable.com>
References: <20240306141256.BE8BE1200A9@fleegle.mixmin.net>
Injection-Date: Wed, 6 Mar 2024 21:56:51 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="09b60be2e0cc39d4ef96f67b840737ba";
logging-data="686743"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19U0GYk7jcN3cnptKT0MFG38e3K+EvTbhs="
Cancel-Lock: sha1:NCGhjOEC9hQUyZp4KmRTv0ox5J8=
 by: The Running Man - Wed, 6 Mar 2024 21:56 UTC

On 06/03/2024 15:12 Stainless Steel Rat <Use-Author-Supplied-Address-Header@[127.1]>
wrote:
> On Wed, 6 Mar 2024 10:50:14 +0100 (CET), Logram <logram@nowhere.org> said:
>
>> https://www.linkedin.com/pulse/4-types-attacks-tor-network-de-anonymize-users-arun-kl
>
> Is It Possible To De-Anonymize a Tor User?
>
> To conclude the answer to this question. De-anonymizing Tor users aren?t
> just theoretical. The governments have caught many Tor users and detained
> them for illegal activities. One such example is silk road an online dark
> website hosted in 2011 by Ross Ulbricht to trade illegal drugs. According
> to Edward Snowden, it is never possible to de-anonymize all Tor users at
> once. But, with manual analysis, it is possible to de-anonymize a very
> small fraction of Tor users. Till now, no success has been seen in
> de-anonymizing a user based on the request or demand.
>
> Bringing up Ross Ulbricht is a red-herring. Ulbricht was found due to his
> use of a Gmail account in his own name: rossulbricht@gmail.com. This account
> was linked to an nym he used (altoid) to advertise Silk Road early on.
>
> The majority of illicit market operators and vendors have been busted using
> similar methods -- another case in point:
>
> Feds say alleged AlphaBay operator Alexandre Cazes welcomed users
> to the dark web drug market with a message that included the email
> address "Pimp_Alex_91@hotmail.com."
>
> https://www.vice.com/en/article/zmv535/alleged-dark-web-kingpin-doxed-himself-with-his-personal-hotmail-address
>
> Stainless Steel Rat
>

I once read about this illegal CP website which had literally hundreds of thousands (!) of registered users. The location of the Tor server was uncovered and several suspects were apprehended. However, they only managed to arrest a handful of the visitors to the web site.

To me this sounds like Tor is safe, most of the time.

Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users

<06230b12-ba12-d8ff-045f-96d47a7d069a@example.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=540&group=alt.privacy#540

  copy link   Newsgroups: alt.privacy
Path: i2pn2.org!.POSTED!not-for-mail
From: nospam@example.net (D)
Newsgroups: alt.privacy
Subject: Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor
Users
Date: Thu, 7 Mar 2024 10:07:02 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <06230b12-ba12-d8ff-045f-96d47a7d069a@example.net>
References: <20240306141256.BE8BE1200A9@fleegle.mixmin.net> <YTXfWwlk6OM7s/kj9uuhgs/JyaDzgN6KiSJuedtXHIc=@writeable.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Injection-Info: i2pn2.org;
logging-data="1163407"; mail-complaints-to="usenet@i2pn2.org";
posting-account="w/4CleFT0XZ6XfSuRJzIySLIA6ECskkHxKUAYDZM66M";
In-Reply-To: <YTXfWwlk6OM7s/kj9uuhgs/JyaDzgN6KiSJuedtXHIc=@writeable.com>
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: D - Thu, 7 Mar 2024 09:07 UTC

On Wed, 6 Mar 2024, The Running Man wrote:

>
> On 06/03/2024 15:12 Stainless Steel Rat <Use-Author-Supplied-Address-Header@[127.1]>
> wrote:
>> On Wed, 6 Mar 2024 10:50:14 +0100 (CET), Logram <logram@nowhere.org> said:
>>
>>> https://www.linkedin.com/pulse/4-types-attacks-tor-network-de-anonymize-users-arun-kl
>>
>> Is It Possible To De-Anonymize a Tor User?
>>
>> To conclude the answer to this question. De-anonymizing Tor users aren?t
>> just theoretical. The governments have caught many Tor users and detained
>> them for illegal activities. One such example is silk road an online dark
>> website hosted in 2011 by Ross Ulbricht to trade illegal drugs. According
>> to Edward Snowden, it is never possible to de-anonymize all Tor users at
>> once. But, with manual analysis, it is possible to de-anonymize a very
>> small fraction of Tor users. Till now, no success has been seen in
>> de-anonymizing a user based on the request or demand.
>>
>> Bringing up Ross Ulbricht is a red-herring. Ulbricht was found due to his
>> use of a Gmail account in his own name: rossulbricht@gmail.com. This account
>> was linked to an nym he used (altoid) to advertise Silk Road early on.
>>
>> The majority of illicit market operators and vendors have been busted using
>> similar methods -- another case in point:
>>
>> Feds say alleged AlphaBay operator Alexandre Cazes welcomed users
>> to the dark web drug market with a message that included the email
>> address "Pimp_Alex_91@hotmail.com."
>>
>> https://www.vice.com/en/article/zmv535/alleged-dark-web-kingpin-doxed-himself-with-his-personal-hotmail-address
>>
>> Stainless Steel Rat
>>
>
> I once read about this illegal CP website which had literally hundreds of thousands (!) of registered users. The location of the Tor server was uncovered and several suspects were apprehended. However, they only managed to arrest a handful of the visitors to the web site.
>
> To me this sounds like Tor is safe, most of the time.
>

I think when considering the power of the state against one individual on
tor, it should be pretty obvious that it is not enough. The main value is
that it has to be good enough to not make it worthwhile for the state to
go after most people there. But high value targets, rest assured, will be
found. It will only be a matter of time.

Re: Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users

<pWJu6Vnqq2MELqPRdckgy8lKAhyTqjIel+7xV90z1gk=@writeable.com>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=542&group=alt.privacy#542

  copy link   Newsgroups: alt.privacy
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: runningman@writeable.com (The Running Man)
Newsgroups: alt.privacy
Subject: Re: Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users
Date: Thu, 7 Mar 2024 14:23:21 -0000 (UTC)
Organization: EasyNews
Lines: 54
Message-ID: <pWJu6Vnqq2MELqPRdckgy8lKAhyTqjIel+7xV90z1gk=@writeable.com>
References: <06230b12-ba12-d8ff-045f-96d47a7d069a@example.net>
Injection-Date: Thu, 7 Mar 2024 14:23:21 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="93f9aa4759cb02e4f9323cc810cb4828";
logging-data="1159109"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+/AM9zIw+svQ8g345S0fVS18RW8jpDpIs="
Cancel-Lock: sha1:IMKAsPseHrBDE9cpzD74QwTvBcs=
 by: The Running Man - Thu, 7 Mar 2024 14:23 UTC

On 07/03/2024 10:07 D <nospam@example.net>
wrote:
>
>
> On Wed, 6 Mar 2024, The Running Man wrote:
>
>>
>> On 06/03/2024 15:12 Stainless Steel Rat <Use-Author-Supplied-Address-Header@[127.1]>
>> wrote:
>>> On Wed, 6 Mar 2024 10:50:14 +0100 (CET), Logram <logram@nowhere.org> said:
>>>
>>>> https://www.linkedin.com/pulse/4-types-attacks-tor-network-de-anonymize-users-arun-kl
>>>
>>> Is It Possible To De-Anonymize a Tor User?
>>>
>>> To conclude the answer to this question. De-anonymizing Tor users aren?t
>>> just theoretical. The governments have caught many Tor users and detained
>>> them for illegal activities. One such example is silk road an online dark
>>> website hosted in 2011 by Ross Ulbricht to trade illegal drugs. According
>>> to Edward Snowden, it is never possible to de-anonymize all Tor users at
>>> once. But, with manual analysis, it is possible to de-anonymize a very
>>> small fraction of Tor users. Till now, no success has been seen in
>>> de-anonymizing a user based on the request or demand.
>>>
>>> Bringing up Ross Ulbricht is a red-herring. Ulbricht was found due to his
>>> use of a Gmail account in his own name: rossulbricht@gmail.com. This account
>>> was linked to an nym he used (altoid) to advertise Silk Road early on.
>>>
>>> The majority of illicit market operators and vendors have been busted using
>>> similar methods -- another case in point:
>>>
>>> Feds say alleged AlphaBay operator Alexandre Cazes welcomed users
>>> to the dark web drug market with a message that included the email
>>> address "Pimp_Alex_91@hotmail.com."
>>>
>>> https://www.vice.com/en/article/zmv535/alleged-dark-web-kingpin-doxed-himself-with-his-personal-hotmail-address
>>>
>>> Stainless Steel Rat
>>>
>>
>> I once read about this illegal CP website which had literally hundreds of thousands (!) of registered users. The location of the Tor server was uncovered and several suspects were apprehended. However, they only managed to arrest a handful of the visitors to the web site.
>>
>> To me this sounds like Tor is safe, most of the time.
>>
>
> I think when considering the power of the state against one individual on
> tor, it should be pretty obvious that it is not enough. The main value is
> that it has to be good enough to not make it worthwhile for the state to
> go after most people there. But high value targets, rest assured, will be
> found. It will only be a matter of time.

That's just your opinion. There's no proof that this is actually the case.

Re: Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize Tor Users

<9cf18508-d3e3-d8b7-6e10-53686f0ad20c@example.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=543&group=alt.privacy#543

  copy link   Newsgroups: alt.privacy
Path: i2pn2.org!.POSTED!not-for-mail
From: nospam@example.net (D)
Newsgroups: alt.privacy
Subject: Re: Re: Re: 4 Types of Attacks on the Tor Network to De-anonymize
Tor Users
Date: Thu, 7 Mar 2024 16:12:34 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <9cf18508-d3e3-d8b7-6e10-53686f0ad20c@example.net>
References: <06230b12-ba12-d8ff-045f-96d47a7d069a@example.net> <pWJu6Vnqq2MELqPRdckgy8lKAhyTqjIel+7xV90z1gk=@writeable.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Injection-Info: i2pn2.org;
logging-data="1190468"; mail-complaints-to="usenet@i2pn2.org";
posting-account="w/4CleFT0XZ6XfSuRJzIySLIA6ECskkHxKUAYDZM66M";
In-Reply-To: <pWJu6Vnqq2MELqPRdckgy8lKAhyTqjIel+7xV90z1gk=@writeable.com>
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: D - Thu, 7 Mar 2024 15:12 UTC

On Thu, 7 Mar 2024, The Running Man wrote:

>
> On 07/03/2024 10:07 D <nospam@example.net>
> wrote:
>>
>>
>> On Wed, 6 Mar 2024, The Running Man wrote:
>>
>>>
>>> On 06/03/2024 15:12 Stainless Steel Rat <Use-Author-Supplied-Address-Header@[127.1]>
>>> wrote:
>>>> On Wed, 6 Mar 2024 10:50:14 +0100 (CET), Logram <logram@nowhere.org> said:
>>>>
>>>>> https://www.linkedin.com/pulse/4-types-attacks-tor-network-de-anonymize-users-arun-kl
>>>>
>>>> Is It Possible To De-Anonymize a Tor User?
>>>>
>>>> To conclude the answer to this question. De-anonymizing Tor users aren?t
>>>> just theoretical. The governments have caught many Tor users and detained
>>>> them for illegal activities. One such example is silk road an online dark
>>>> website hosted in 2011 by Ross Ulbricht to trade illegal drugs. According
>>>> to Edward Snowden, it is never possible to de-anonymize all Tor users at
>>>> once. But, with manual analysis, it is possible to de-anonymize a very
>>>> small fraction of Tor users. Till now, no success has been seen in
>>>> de-anonymizing a user based on the request or demand.
>>>>
>>>> Bringing up Ross Ulbricht is a red-herring. Ulbricht was found due to his
>>>> use of a Gmail account in his own name: rossulbricht@gmail.com. This account
>>>> was linked to an nym he used (altoid) to advertise Silk Road early on.
>>>>
>>>> The majority of illicit market operators and vendors have been busted using
>>>> similar methods -- another case in point:
>>>>
>>>> Feds say alleged AlphaBay operator Alexandre Cazes welcomed users
>>>> to the dark web drug market with a message that included the email
>>>> address "Pimp_Alex_91@hotmail.com."
>>>>
>>>> https://www.vice.com/en/article/zmv535/alleged-dark-web-kingpin-doxed-himself-with-his-personal-hotmail-address
>>>>
>>>> Stainless Steel Rat
>>>>
>>>
>>> I once read about this illegal CP website which had literally hundreds of thousands (!) of registered users. The location of the Tor server was uncovered and several suspects were apprehended. However, they only managed to arrest a handful of the visitors to the web site.
>>>
>>> To me this sounds like Tor is safe, most of the time.
>>>
>>
>> I think when considering the power of the state against one individual on
>> tor, it should be pretty obvious that it is not enough. The main value is
>> that it has to be good enough to not make it worthwhile for the state to
>> go after most people there. But high value targets, rest assured, will be
>> found. It will only be a matter of time.
>
> That's just your opinion. There's no proof that this is actually the case.

Plenty of people with businesses on darknet that have gotten caught. And
actually, if you are serious about your threat model, it is tor that have
to prove they are safe, not the other way around.

If you're interested, but I doubt you are, a search for tor and
vulnerability should give you plenty to read.


computers / alt.privacy / 4 Types of Attacks on the Tor Network to De-anonymize Tor Users

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor