Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

Razer g2s at riseup.net
Sun Feb 9 07:43:03 PST 2020



On 2/9/20 3:40 AM, grarpamp wrote:
> Early on August 2 or 3, 2013, some of the users noticed “unknown
> Javascript” hidden in websites running on Freedom Hosting. Hours
> later, as panicked chatter about the new code began to spread, the
> sites all went down simultaneously. The code had attacked a Firefox
> vulnerability that could target and unmask Tor users—even those using
> it for legal purposes such as visiting Tor Mail—if they failed to
> update their software fast enough.

The article answers the question.

Rr

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20200209/59534e30/attachment.sig>


More information about the cypherpunks mailing list