Article Image
News Link • Surveillance

Law enforcement seized Tor nodes and may have run some of its own

• ars technica

Tor Project director Andrew Lewman went over the possible ways that over 400 hidden services on dozens of servers were located by law enforcement during Operation Onymous. While some of the servers were related to criminal activity (such as Silk Road 2.0), at least some of the servers were not—including several that were acting as infrastructure for Tor's anonymizing network. And the only answer Lewman could currently offer as to how the sites were exposed was "We don't know."...

1 Comments in Response to

Comment by Ed Price
Entered on:

They are sophisticated enough that they pass me with ease between my regular Firefox and the TOR Firefox. But they aren't sophisticated enough, or I'm not important enough, that they recognize when I jump between regular Firefox and TOR. I can see it in how my browsers act.


Join us on our Social Networks:

 

Share this page with your friends on your favorite social network:


Purse.IO Save on All Amazon Purchases