Fwd: Freedom Hosting Owner Arrested, Tormail Compromised, Malicious JS Discovered

The Doctor drwho at virtadpt.net
Wed Aug 14 10:14:13 PDT 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/12/2013 09:47 AM, David Vorick wrote:

> And finally, it's possible that TSR uses additional layers of 
> protection, like VPN through countries outside of US jurisdiction,
> so that even when you unwrap tor TSR remains hidden.

It's also possible that they found a way to compromise FH and tamper
with other sites running on that service.  If you ask for hosting
(which they offered), and they give it to you, and you deliberately
upload a web application that you know you can use to execute
arbitrary code on the server side, it suddenly becomes a lot easier to
spike popular sites on the same machine.

Or, set up your own site as a sting and pack all the exploits you want
behind the frontpage.

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

"This time we're using four times the Kevlar."

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlILuuUACgkQO9j/K4B7F8E3gACgi6o7EUn1Y6fX6nNgif1rXYsu
QJMAn3zJHIfYfaOkqA+NcPG5ltytXnmL
=QAcu
-----END PGP SIGNATURE-----



More information about the cypherpunks mailing list