[tor-talk] Looking for information about onion site user deanonymization
0xloem at gmail.com
Fri May 7 15:28:53 PDT 2021
In the past an organisation would alter the website to compromise the
systems of its users, secretly installing malicious code on them to track
This involves retaining a set of dangerous and publicly usable security
vulnerabilities that are not reported to developers of the systems used
(such as Firefox), and possibly even influencing the development
communities so that the security vulnerabilities are not fixed. This
produces a situation where a global body of users have their systems open
to being taken over by anybody else who discovers the vulnerability.
Nowadays analyticl server farms are smarter, people more knowledgeable, and
operating systems more backdoored, and that may not be needed, I don't know.
On Mon, May 3, 2021, 10:00 PM grarpamp <grarpamp at gmail.com> wrote:
> ---------- Forwarded message ----------
> From: Seth David Schoen <schoen at loyalty.org>
> Date: Sun, 2 May 2021 23:20:05 -0700
> Subject: [tor-talk] Looking for information about onion site user
> To: tor-talk at lists.torproject.org
> Hi tor-talk,
> I'm working as a consultant to a criminal defense lawyer who's
> representing a defendant in a case involving Tor and an investigation
> by U.S. law enforcement and foreign law enforcement.
> In 2019 a foreign law enforcement agency claimed to identify the clearnet
> IP addresses of a large number of people who were accessing an onion
> site that the agency itself was monitoring or had taken control of.
> We know of various methods by which this might be done, but I'm wondering
> whether anyone has heard concretely about law enforcement capabilities
> or practices in this area if users have not de-anonymized themselves,
> or rumors or reports of this being done about two years ago.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 2738 bytes
Desc: not available
More information about the cypherpunks