Feds used Adobe Flash to identify Tor users visiting child porn sites

A little more than 16 months ago, word emerged that the FBI exploited a recently patched Firefox vulnerability to unmask Tor users visiting a notorious child pornography site. It turns out that the feds had waged an even broader uncloaking campaign a year earlier by using a long-abandoned part of the open source Metasploit exploit framework to identify Tor-using suspects.

The Decloaking Engine went live in 2006 and used five separate methods to break anonymization systems. One method was an Adobe Flash application that initiated a direct connection with the end user, bypassing Tor protections and giving up the user's IP address. Tor Project officials have long been aware of the vulnerability and strenuously advise against installing Flash. According to Wired:

The decloaking demonstration eventually was rendered obsolete by a nearly idiot-proof version of the Tor client called the Tor Browser Bundle, which made security blunders more difficult. By 2011, Moore says virtually everyone visiting the Metasploit decloaking site was passing the anonymity test, so he retired the service. But when the bureau obtained its Operation Torpedo warrants the following year, it chose Moores Flash code as its network investigative techniquethe FBIs lingo for a court-approved spyware deployment.

Torpedo unfolded when the FBI seized control of a trio of Dark Net child porn sites based in Nebraska. Armed with a special search warrant crafted by Justice Department lawyers in Washington DC, the FBI used the sites to deliver the Flash application to visitors browsers, tricking some of them into identifying their real IP address to an FBI server. The operation identified 25 users in the US and an unknown number abroad.

Gross learned from prosecutors that the FBI used the Decloaking Engine for the attack they even provided a link to the code on Archive.org. Compared to other FBI spyware deployments, the Decloaking Engine was pretty mild. In other cases, the FBI has, with court approval, used malware to covertly access a targets files, location, web history and webcam. But Operation Torpedo is notable in one way. Its the first timethat we know ofthat the FBI deployed such code broadly against every visitor to a website, instead of targeting a particular suspect.

The tactic is a direct response to the growing popularity of Tor and, in particular, an explosion in so-called hidden servicesspecial websites, with addresses ending in .onion, that can be reached only over the Tor network.

Hidden services are a mainstay of the nefarious activities carried out on the so-called Dark Net, the home of drug markets, child porn, and other criminal activity. But theyre also used by organizations that want to evade surveillance or censorship for legitimate reasons, like human rights groups, journalists, and, as of October, even Facebook.

A big problem with hidden service, from a law enforcement perspective, is that when the feds track down and seize the servers, they find that the web server logs are useless to them. With a conventional crime site, those logs typically provide a handy list of Internet IP addresses for everyone using the site quickly leveraging one bust into a cascade of dozens, or even hundreds. But over Tor, every incoming connection traces back only as far as the nearest Tor nodea dead end.

Taken together, Operation Torpedo and the campaign used last year to identify Tor-using child porn suspects demonstrate the determination feds show in bypassing Tor protections. They also underscore the feds' rapidly growing skill. Whereas Operation Torpedo abused a six-year-old weakness that ensnared only people who ignored strenuously repeated advice, the latter operation exploited a vulnerability that had only recently been patched in Firefox.

Read more from the original source:

Feds used Adobe Flash to identify Tor users visiting child porn sites

Tor Browser 4.5-alpha-1 is released | The Tor Blog

The first alpha release of the 4.5 series is available from the extended downloads page and also from our distribution directory.

This release features a circuit status reporting UI (visible on the green Tor onion button menu), as well as isolation for circuit use. All content elements for a website will use a single circuit, and different websites should use different circuits, even when viewed at the same time. The Security Slider is also present in this release, and can be configured from the green Tor onion's Preferences menu, under the Privacy and Security settings tab. It also features HTTPS certificate pinning for selected sites (including our updater), which was backported from Firefox 32.

This release also features a rewrite of the obfs3 pluggable transport, and the introduction of the new obfs4 transport. Please test these transports and report any issues!

Note to Mac users: As part of our planned end-of-life for supporting 32 bit Macs, the Mac edition of this release is 64 bit only, which also means that the updater will not work for Mac users on the alpha series release channel for this release. Once you transition to this 64 bit release, the updater should function correctly after that.

Here is the complete changelog since 4.0.1:

More:

Tor Browser 4.5-alpha-1 is released | The Tor Blog

A Computer Science Professor Found A Way To Identify Most 'Anonymous' Tor Users

Tor was supposed to be an anonymous means of browsing the Internet, but a study by computer science professorSambuddho Chakravarty reveals that 81 percent of those using Tor can be de-anonymized by exploiting a technology in Cisco routers called Netflow. The ploy reveals a user's originating IP address, which is analogous to identifying someone's home address even if he or she uses a P.O. box.

By facilitating anonymity online, Tor enables people around the world to communicate securely and get around firewalls that might block certain sites in their countries. It's also the technology that facilitated the notorious Silk Road (and subsequent iterations), seeing people trade bitcoins for assorted black market paraphernalia through the mail. The nonprofit project enables freedom of the press around the world and, for at least a time, presented a means to mail-order drugs.

The Tor browser works by way of decentralization. Your Web traffic doesn't come directly to you, but instead arrives by way of a number of relays. Each relay makes it increasingly difficult to identify the traffic's ultimate destination, shielding you from being associated with it. The trade-off is one of speed for purported anonymity, but this Netflow exploit is only the latest among a few incidents that seem to be punching holes in the browser's popular conception as a bulletproof security fiend.

"That general understanding is wrong," Kevin Johnson, CEO of independent security consulting firm SecureIdeas,said. "Tor runs on top of a complex series of interconnections between apps and the underlying network. To expect that everything in that system is going to understand and respect it, it becomes very complex."

Consider Web traffic as though it were automobile traffic flowing down a highway. To assume that all Web traffic will follow Tor's anonymizing "rules" is akin to assuming that every car on the highway follows all the traffic regulations, but "as we know by looking at any news report, a number of people have accidents every day," Johnson said. "The exact same thing happens with Tor. Its a highway system with an application that says 'go this way,' and we expect all of our apps to follow those signs."

Johnson says that Cisco's Netflow, which sits at the heart of the exploit that can de-anonymize these Tor users, is comparable to the Department of Transportation's analytics on a given stretch of road. Instead of identifying the types of traffic -- 15 percent motorcycles, 25 percent sedans, 40 percent semi trucks, and so on --Netflow can break down Internet traffic into its various types, say 50 percent email, 35 percent Web traffic, and the remainder being Tor. Chakravarty'stechnique for exploiting Netflow works by injecting a repeating traffic pattern, such as the common HTML files that most Tor users are likely to be accessing, into the connection and then checking the routers flow records to check for a match. If it finds a match, then the user is no longer anonymous.

"When youre looking at those kind of attacks, they're done by government state agencies, usually foreign governments suppressing protesters or tracking dissidents. It's harder to do in America because there's so much other traffic," said Jayson Street, who bears the job title of Infosec Ranger atsecurity assessment firm Pwnie Express.

The takeaway is clear: Tor used by itself is hardly some one-stop shop to ensure anonymity online. "End users dont know how to properly configure it -- they think its a silver bullet," Street said. "They think once they use this tool, they dont have to take other precautions. It's another reminder to users that nothing is 100 percent secure. If you're trying to stay protected online, you have to layer your defenses."

More here:

A Computer Science Professor Found A Way To Identify Most 'Anonymous' Tor Users

Better Tor-gether? Mozillla bids to bring anonymous browsing to the masses

The Mozilla Foundation isnt stupid. It knows that many people are worried about their online privacy and really arent keen on being tracked or spied upon by advertisers and spy agencies. And so to cater to this group of paranoid Web users, the maker of the popular Firefox browser has just launched a new initiative called Polaris, in partnership with the Messiah of Internet privacy the Tor Project.

Two projects have been devized under the initiative. The first one sees Mozilla and the Tor Project working alongside the Center for Democracy & Technology (CDT) to create privacy technology, open standards, and future product collaborations, according to Tors Andrew Lewman. Mozillas engineers are working to see how they can make Tor better and faster, which is significant because the Tor browser uses much of Firefoxs code.

Mozilla didnt reveal what improvements its working on to make things better, but it did say how it plans to speed things up. This will involve Mozilla hosting its own high-capacity Tor relays to boost the networks current, limited capacity.

Mozilla engineers are evaluating the Tor Projects changes to Firefox, to determine if changes to our own platform code base can enable Tor to work more quickly and easily, said Mozillas Denelle Dixon-Thayer in a blog post.

As for the second project, this sounds even more exciting and could potentially lead to a significant rise in Tor usage. Mozilla says its working on an experiment with its nightly builds to develop a way to keep advertisers happy without having to track people all over the web.

[It looks at] how we can offer a feature that protects those users that want to be free from invasive tracking without penalising advertisers and content sites that respect a users preferences, Dixon-Thayer said.

She added that the experiment was far from finished, and would be refined over the coming months as they received feedback from users.

Its not clear exactly what this experiment entails, but it does sound an awful lot like the rumored Tor button for Firefox. If this feature is indeed implemented into the main Firefox browser, given its popularity, its likely there would be an explosion in the number of people using Tor, not too mention more explosions of rage from senior US law enforcement officials 🙂

What with Facebook having recently launched a special URL optimized for people using Tor, its about to become a whole lot easier to remain anonymous when were browsing the web.

Excerpt from:

Better Tor-gether? Mozillla bids to bring anonymous browsing to the masses

Developer edition and privacy are Firefoxs 10th birthday present for the world

Firefox 1.0 was released10years ago yesterday, and as a celebration of sorts, Mozilla released a new version of the browser that's intended to help users control their privacy online as well as a new developer-oriented version of the browser.

The main feature of the new Firefox release, 33.1, is a "Forget" button on the toolbar thatcaninstantly wipe the last five minutes, two hours, or one day of browsing history, cookies, and tabs. This isn't a new capability itselfthe Privacy panel of the options dialog has long offered this abilitybut in Firefox 33.1, it's now instantly accessible.

The new release also adds DuckDuckGo as a search engine. DuckDuckGo positions itself as a more private search engine, one that tracks less user data while recording no search history and having no identifiable user accounts.

On top of all that, Mozilla launched the Polaris Privacy Initiative, an effort to develop technology to enhance browser privacy. Two Polaris experiments were announced today. First, Mozilla is working more closely with the Tor Project. The Tor Project uses Firefox as the browser in its Tor Browser Bundle, and the Tor engineers have suggested a list of changes to Firefox that would make using Firefox and Tor together better. Mozilla is investigating whether these changes can be incorporated into Firefox. The browser developer is also going to host Tor servers of its own, increasing the capacity of the anonymous network.

Second, Mozilla istakinganother stab at preventing advertisers from tracking user activity across the Web. This will use blacklists that prevent access entirely to certain domains used by third-party trackers. This feature is currently being tested and developed in Firefox's Nightly builds.

Firefox Developer Edition is a new variant of Firefox that replaces the Aurora channel running two versions ahead of the stable release (so currently, Firefox stable is version 33, Beta is 34, and Aurora/Developer is 35). It's designed to both give developers an early look at forthcoming features and to be a better platform for Web development in general.

Firefox already includes extensive developer features,including a development environment.Firefox Developer Edition makes these things easier to use by, for example, including Mozilla's add-in that lets Firefoxdebug Web content on iOS and Android. It alsocomes pre-configured to support remote debugging.

The new offering even has a fancy dark theme that makes it look visually distinct from the regular Firefox edition.

See more here:

Developer edition and privacy are Firefoxs 10th birthday present for the world

The Law Scores a Victory Against Dark Net Denizens

Europol on Friday announced that a team of agents from United States Immigration and Customs Enforcement, the U.S. Federal Bureau of Investigation and Eurojust have taken down more than 400 cybercrime services accessible via the Tor browser.

They include the dark market Silk Road 2.0. Its operator, San Francisco resident Blake Benthall, was arrested, along with six Britons.

Europol coordinated the action, which was dubbed "Operation Onymous."

"Almost all crime now has an international nexus -- and especially within HSI, we have significant dependency on other partners in law enforcement here and in other countries," Gary Hartwig, special agent in charge of Homeland Security Investigations in Chicago, told the E-Commerce Times.

In all, the cops arrested 17 vendors and administrators running the cybercrime sites. Officials seized about US$1 million worth of bitcoins, along with an estimated $225,000 worth of cash, gold, silver and drugs.

Forty law enforcement agents reportedly collaborated for six months on the investigation before the crackdown. Among the sites taken down: Cloud Nine, Hydra, BlueSky, Outlaw Market and Alpaca.

More arrests are expected.

"While I would like to think our enforcement actions this week shut down [the bad guys], Dark Net or Silk Road are such significantly complex criminal structures that we're going to have to continue to monitor things," Hartwig said.

Onymous "is a great example of how 20th century law enforcement tactics and undercover operations are still viable in the 21st century, despite drastic changes to the criminal landscape," Craig Young, a security researcher at Tripwire, told the E-Commerce Times.

Cloud9 already is looking for a new host, according to a post by "missy76," who seems to be one of the site's admins.

Visit link:

The Law Scores a Victory Against Dark Net Denizens