welcome

This website uses cookies to ensure you get the best experience on our website.
Please scroll to the bottom of page to read the notice if you are coming from the European Union...

Wednesday, April 27, 2016

Former Tor Developer Created Malware To Hack Tor Users For The FBI (dailydot.com)

Matt Edman is a cybersecurity expert who worked as a part-time employee at Tor Project, the nonprofit that builds Tor software and maintains the network, almost a decade ago. 


Since then, he's developed potent malware used by law enforcement to unmask Tor users.

 It's been wielded in multiple investigations by federal law-enforcement and U.S. intelligence agencies in several high-profile cases.

 The Tor Project has confirmed this report in a statement after being contacted by the Daily Dot, "It has come to out attention that Matt Edman, who worked with the Tor Project until 2009, subsequently was employed by a defense contractor working for the FBI to develop anti-Tor malware."

Maybe Tor users will now be less likely to anonymously check Facebook each month...

 Best Alternatives to Tor: 12 Programs to Use Since NSA,
Hackers Compromised Tor Project


 Tor has been compromised, the Tor Project has recently suffered from two security setbacks which have called into question just how safe users on the anonymity service are.

 The first big major setback was the cancelation of CERT's attendance the Black Hat 2014 talk which would have dealt with attacks on Tor and how it is possible for Tor to be breached. 

The cancellation was troubling because it raised the possibility that government or intelligence agencies put pressure on CERT (a division of SEI at Carnegie Mellon which "workers closely with the Department of Homeland Security") to cancel. 

Some researchers later said that lawyers had blocked the Black Hat demo which showed how Tor could be de-anonymized.

 In any case, it's best to assume that Tor has been compromised by the NSA, DHS, FBI and pretty much any other government intelligence agency, domestic and foreign.

To make matters worse Tor suffered from an attack in early July where a group of relays were discovered trying to de-anonymize Tor users.


Tails

Tails is without a doubt the best and most secure supplement to Tor. It's a Linux based live operating system that can work on any computer. The Tails OS can be booted from pretty much any removable device like a DVD, USB or SD card. The main benefit of Tails is that it has built-in pre-configured applications that provide a web browser, IM client, email client, office suite, image and sound editor and other applications. Tails does use the Tor network by routing all internet connections through Tor, but Tails provides excellent additional security and may serve to keep you anonymous where Tor might otherwise have been compromised. The main benefit is the fact that even if you are caught, it leaves no evidence:
Use anywhere but leave no trace

Using Tails on a computer doesn't alter or depend on the operating system installed on it. So you can use it in the same way on your computer, a friend's or one at your local library. After shutting down Tails, the computer can start again on its usual operating system.
Tails is configured with special care to not use the computer's hard-disks, even if there is some swap space on them. The only storage space used by Tails is the RAM, which is automatically erased when the computer shuts down. So you won't leave any trace neither of the Tails system nor of what you did on the computer. That's why we call it "amnesic".
This allows you to work on sensitive documents on any computer and protect you from data recovery after shutdown. Of course, you can still explicitly save some documents to another USB or external hard-disk and take them away for future use.

I2P

I2P is a full alternative to Tor. It acts as an anonymous overlay network, "a network within a network" and can protected against dragnet surveillance and monitoring from ISP's or other third parties.

Freenet

Freenet is another Tor alternative, similar to I2P it offers a full alternative to Tor and allows you to anonymously share files, chat, browse, and publish, "Communications by Freenet nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the information and what its content is.

Subgraph OS

Subgraph OS is fairly similar to Tails, meaning that it utilizes Tor but with a focus on security and usability, "Subgraph OS is designed to be difficult to attack. This is accomplished through system hardening and a proactive, ongoing focus on security and attack resistance. Subgraph OS also places emphasis on the integrity of installable software packages." There are several layers between Subgraph OS and Tor such as a Metaproxy, firewall and hardened kernel.

Freepto

Freepto is yet another software similar to Tor, it is a Linux based OS on a USB stick. It can be used on any computer and any data saved is automatically encrypted. It's easy to use and seems to be geared toward activists.

iprediaOS

iPredia OS, again is a Linux based OS that automatically encrypts and anonymizes network traffic.

JonDo Live-CD

JonDo Live-DVD another Debian GNU/Linux based OS. JonDo has pre-configured applications to be used for web surfing, has Torbrowser, Thunderbird, Pdigin and other programs.

Lightweight Portable Security

LPS is a Linux based OS that boots from a CD or USB and can then be mounted onto the local hard drive.

Whonix

Whonix is an anonymous Linux operating system based on the Tor network and works by isolation. It is impossible for DNS leaks or malware to find the real IP address of a user, "Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible."

Peerblock

Peerblock isn't a full scale privacy software and shouldn't be relied on to protect you by itself. You should run it in addition to other programs. Peerblock allows you to control who your computer interacts with:
PeerBlock lets you control who your computer "talks to" on the Internet. By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries! They can't get in to your computer, and your computer won't try to send them anything either.
And best of all, it's free!

Disconnect:

Disconnect offers a number of privacy options for browsing and search for desktop, iOS and Android devices. It's no replacement for Tor or other privacy software but it can be useful for your phone and browser, "We crawl the web to find the companies that track people, then Disconnect blocks those companies' tracking requests in your browser." As with Peerblock, Disconnect is a supplement, not a replacement.

Tox

Tox isn't a full replacement for Tor, but it can serve to provide messaging services. Tox offers private and encrypted IM, video conferencing and calls that is fairly easy to use.

 http://fossbytes.com/best-alternatives-to-tor-browser-to-browse-anonymously/


FBI Director James Comey’s war on privacy is completely out of control.


Comey’s recent crusade against Apple is just the latest of many attempts to curtail our civil rights and invade our privacy in the name of national security -  he has been endangering communities and security technology for decades.

He was instrumental in creating the vast domestic spy program that exists today. After 9/11, he authorized Bush’s massive, illegal domestic surveillance program and approved torture techniques like waterboarding. [1]


The FBI should protect the people: sign our open letter and tell Comey he’s out of control.


The government has access to more information and people now than ever.  

 And yet, Comey insists he needs more.  

 After lying to Congress about the need to sue Apple to build a backdoor into the iPhone, the FBI paid hackers over $1.3 million to access the San Bernadino iPhone. 

He’s since admitted that the lawsuit would have set a legal precedent that we know is dangerous, and we’re not alone.

Even the NSA thinks Comey is spying too hard.
 
Current and former NSA directors have spoken out against him. 

 NSA Director Adm. Mike Rogers has called the FBI’s campaign against encryption a “waste of time.”[2] 

 Rogers believes that end-to-end encryption is foundational to national security.


FBI Director Comey’s obsession with other people’s secrets could seriously harm our national security.

 Sign our petition telling him to resign.


For freedom,
Lizzy 

[1] http://www.theguardian.com/commentisfree/2013/may/30/james-comey-fbi-bush-nsa
[2] https://youtu.be/wnTGO6OFgCo?t=25m30s

No comments:

Post a Comment