Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Lizard Squad launches Tor 0day - Page 3
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Lizard Squad launches Tor 0day

13»

Comments

  • I am pretty sure that @ub3rstar is a pedophile. Those who cry the loudest.... ;-)

  • emgemg Veteran
    edited December 2014

    Excuse me for repeating myself, but TOR has many uses. The majority of TOR users are not using it illegal activities.

    There are many who use TOR for illegal activities, such as child pornography. It would not surprise me to learn that the vast majority of those who deal with child pornography are familiar with TOR and use it to cover up their activities. The number of people who deal in child pornography is probably higher than most of us would like to think, but they are still very low in numbers compared with the general population. Just because most child pornographers use TOR does not mean that most TOR users are child pornographers. Just because many illegal activities are performed with TOR does not mean that most TOR users are performing illegal activities.

    TOR is a frustrating thorn in the side of law enforcement and other government agencies, and eliminating it would make it easier for them to do their work. They have grown accustomed to having unfettered access to the communications of the general population. They worry that TOR and other technologies will deny them that access. It makes sense that they would bring out terrorists, child pornographers, drug dealers, copyright pirates, and other scary examples to gain popular support to eliminate unrestricted use of those technologies. At the very same time, law enforcement and government agencies value and use those technologies for themselves. Yes, they use TOR. A lot.

    Law enforcement and government agencies have a deeply entrenched, near religious belief in a world where everyone has the best, strongest security to keep data safe, while at the same time, law enforcement and governments have trusted, unrestricted, secret access to that same data. They believe that they can be trusted to use their authority and access only for "good", however you define the term. They believe that "key escrow" failed due to poor implementation and politics, not because the concept is fundamentally unsound. They do not understand that providing their desired access to data weakens security for all, and leaves everyone open to harm. (Sometimes they believe that the harm that backdoor access causes is less than the harm that would be done by those that they target if we continue to allow unrestricted access to encryption and anonymity technologies.)

    Imagine a world where law enforcement eliminates TOR and enforces laws so that Google and others can only build systems with backdoors installed. Law enforcement is trusted to obtain warrants when they want to use the backdoors. What happens when the recognized, legitimate government of France wants access to the same backdoors? What about Algeria? Russia? China? Venezuela? Liberia? Cuba? Iran? Bhutan? North Korea?

    I will say it again - the majority of TOR users are not using it illegal activities. The ones who use it for illegal activities get the spotlight for many reasons, and that spotlight fulfills many ulterior agendas.

    Thanked by 1im_jmz
  • ub3rstar said: What I was trying to say is Tor's only use seems to be for illegal activities.

    No.

    Thanked by 2ihatetonyy MrObvious
  • @emg said:
    What happens when the recognized, legitimate government of France wants access to the same backdoors?

    The "legitimate government" of France is already doing its own NSA-like snooping. Here's the law that allows it to (in French): http://www.senat.fr/dossier-legislatif/pjl12-822.html

  • @frank said:
    Its not the NSA, but signs do point to them being a state actor.

    word

  • I still cant believe no one's mentioned how google's cloud has obviously been compromised, they are/were using google cloud ip's =P #YourCloudDataIsNowPublic

  • J1021J1021 Member
    edited December 2014

    jeffreylroberts said: I still cant believe no one's mentioned how google's cloud has obviously been compromised, they are/were using google cloud ip's =P #YourCloudDataIsNowPublic

    https://cloud.google.com/

  • @jeffreylroberts said:
    I still cant believe no one's mentioned how google's cloud has obviously been compromised, they are/were using google cloud ip's =P #YourCloudDataIsNowPublic

    They probably just used the free trial.

  • MaouniqueMaounique Host Rep, Veteran
    1. Most online illegal activities happen on the internet. It should be shutdown. Then those will move in the street where they are already, so we need to impose curfews in the "black" areas all the time and from 20 to 8 in the others;
    2. Online criminals do not need Tor as they did not need it before. They use other illegal means, mostly botnets and compromised servers to access services anonymously and launch attacks;
    3. Law enforcement should re-learn to do their job. What non-profit associations can do, law enforcement should learn to do too, mainly sting and undercover operations, it is trivial to catch criminals that way, may not catch the best, but you wont catch those, Tor or without with stupid cops that think IP=criminal location.
    Thanked by 1trexos
  • Lousing your time to hack something without to win a dollar its lame. If there are kids np, but what the hell are doing the adults

  • Most TOR nodes are compromised, at least the exit nodes.

  • @shillshocked said:
    Most TOR nodes are compromised, at least the exit nodes.

    Source?

    Thanked by 1netomx
  • @shillshocked said:
    Most TOR nodes are compromised, at least the exit nodes.

    But because the request comes from another relay, they don't know which IP originally made the request. Isn't that why Tor is ideal?

  • hostnoob said: But because the request comes from another relay, they don't know which IP originally made the request. Isn't that why Tor is ideal?

    Yes. Tor protects the surfer, not the content.

    Thanked by 1hostnoob
  • @shillshocked said:
    Most TOR nodes are compromised, at least the exit nodes.

    THANK YOU . been trying to explain this to a few people i know
    seems to go over their head :)

  • MaouniqueMaounique Host Rep, Veteran

    You can run relays without worrying. They are very important to protect the IP of the surfer, even if the exits are compromised and you are not using "HTTPS anywhere". The server will know you are coming from Tor, the exit will know what you are doing, but will not be able to pin it to you.
    So, for example, NSA (chinese, russian, iranian, israeli secret services, etc) will know someone using Tor posted a call for civil disobedience, but will not be able to track who did that, unless you give that information yourself (for example logging on to your twitter account without Tor at least once or giving real data at the registration).

Sign In or Register to comment.