View Full Version : TOR was a DOJ/NSA/FBI Honey pot..I knew? Who else knows about their OTHER Honeypots?
EarthSheriff
17th January 2015, 17:48
TOR was a DOJ/NSA/FBI Honey pot..I knew? Who else knows about their OTHER Honeypots?
They are sneaky, but I will share my clues with you..if you share your clues FIRST with me..?
can you imagine a better honeypot than TOR.?
ID's IP addresses for all that want to be top secret on the internet?
SOURCE: http://www.wired.com/2014/12/fbi-metasploit-tor/
For more than a decade, a powerful app called Metasploit has been the most important tool in the hacking world: An open-source Swiss Army knife of hacks that puts the latest exploits in the hands of anyone who’s interested, from random criminals to the thousands of security professionals who rely on the app to scour client networks for holes.
Now Metasploit has a new and surprising fan: the FBI. WIRED has learned that FBI agents relied on Flash code from an abandoned Metasploit side project called the “Decloaking Engine” to stage its first known effort to successfully identify a multitude of suspects hiding behind the Tor anonymity network.
That attack, “Operation Torpedo,” was a 2012 sting operation targeting users of three Dark Net child porn sites. Now an attorney for one of the defendants ensnared by the code is challenging the reliability of the hackerware, arguing it may not meet Supreme Court standards for the admission of scientific evidence. “The judge decided that I would be entitled to retain an expert,” says Omaha defense attorney Joseph Gross. “That’s where I am on this—getting a programming expert involved to examine what the government has characterized as a Flash application attack of the Tor network.”
A hearing on the matter is set for February 23.
Tor, a free, open-source project originally funded by the US Navy, is sophisticated anonymity software that protects users by routing traffic through a labyrinthine delta of encrypted connections. Like any encryption or privacy system, Tor is popular with criminals. But it also is used by human rights workers, activists, journalists and whistleblowers worldwide. Indeed, much of the funding for Tor comes from grants issued by federal agencies like the State Department that have a vested interest in supporting safe, anonymous speech for dissidents living under oppressive regimes.
With so many legitimate users depending upon the system, any successful attack on Tor raises alarm and prompts questions, even when the attacker is a law enforcement agency operating under a court order. Did the FBI develop its own attack code, or outsource it to a contractor? Was the NSA involved? Were any innocent users ensnared?
A clue folks! ANYTHING the DoD makes is a HoneyPot! ha! ha!
LivioRazlo
17th January 2015, 20:28
I mean, TOR was originally developed by the U.S. Navy - so it's no surprise to me that all of these alphabet agencies would have a backdoor built in to them. Times like these make me glad that I'm still young and fresh of ideas which have the common good of humankind in mind.
Matisse
17th January 2015, 21:01
This is the main reason i haven't yet used TOR, thinking that wanting to be anomynous would make me a target, like encrypting my emails maybe would make someone want to read them, sometimes it's best to hide in plain sight... yes TOR would make the perfect honey pot trap... I didn't know that it was funded by the navy and the state department...!!! this raises a red flag...
If you want to be less visible, (anomynous doesn't really exist) using a VPN server is more important than using TOR.
Karma Ninja
17th January 2015, 21:09
I'll show you mine if you show me yours??? Aside from the information regarding TOR browsers (which is helpful as I used to be a user) what was the purpose of this post? I will share with you if you share yours first? It's almost like a government agent trolling alt news sites looking for how aware people are of the spying. I would imagine if you were actually here to help you would have presented your evidence regarding the other sites without putting some ridiculous carrot out for others to bite. Not saying your intention was purely malicious but this seems weird to me.
Nonetheless, here is your clue... Absolutely all OS's, browsers, apps, tools and whatever we use to access the internet is being monitored. All of it. If you really think there is anything happening anonymously on the internet you should give your head a shake. All the big corporations which offer internet service are now complicit and allow government virtually free, untethered, unmonitored access to everything you do. There are no secrets on the internet. The article above merely shows us that even the more sophisticated anonymity tools are not secure at all.
Which doesn't mean you should feel afraid or otherwise. Just carry on as we always did.
EarthSheriff
17th January 2015, 21:26
Karma Ninja there are a number of ways to score an environment. yes you are correct as I have had HTML links broken by INTEL recently 1) http://fedbullies.com/ 2) Link they broke: https://www.linkedin.com/pulse/nuclear-nazi-usa-false-flag-christmas-david-sweet
EarthSheriff
17th January 2015, 21:31
a good movie about $ PAID INTEL Opposition with only 2 Fracking messages Promised Land Official Trailer #1 (2012) - Matt Damon Movie HD https://www.youtube.com/watch?v=5GDuVbXKQ9U They now have 10,000+ feeding ET Based AI systems to Score Population IQ's, REACTION modeling, etc..ask to learn more..?
Anchor
17th January 2015, 22:56
Tor is a privacy system not a secrecy system - and it only does that if you use it properly.
Encryption is not privacy, just a component of it.
If you use TOR there are several things you must do to keep both privacy (of your activities and your identities) and the secrecy (of your information) in tact.
TOR does have many "evil" exit nodes, these are nodes owned by people who monitor the traffic coming out of them - frequently this traffic is unencrypted because people mistakenly assume TOR looks after them. It does not. End to end, properly implemented encryption is essential.
If you are using TOR using your regular every day browser and every day computer and think you can sneak around unmonitored then you should have another think because in all likelyhood, if you are a target then your activities will be monitored and your usage will be known (look up browser fingerprinting https://panopticlick.eff.org/).
If you need to do something seriously private, consider using (an up to date version of) TAILS, this is one of the best solutions for a non-security expert who doesn't know the pitfalls and helps you maintain a high level of operational security that has a reasonably good chance of being NSA resistant.
Full time, non-stop, end to end encryption is not as easy as it sounds, for example it is hard to do on this very forum due to the way the site is implemented. As an experiment I tried it when I was at work - and it was hopeless. Every page had some unencrypted content and none of the links were secured. (I can't add plugins to the browser at work). It doesn't matter either. I like to think that Avalon takes the middle finger approach to the NSA and the other TLAs - we just don't care if they read it or know who contributes - in fact we hope they do and get a good laugh or maybe even learn something! There are a few diamonds in the rough here and I am sure the TLAs know who is who, (1) which are the ones in their employ, (2) which are the deluded and (3) which are awake and aware (the dangerous ones!). Group 1 is often set to stir up Group 2 and at best have a small chance of frustrating group 3!
Generally though, you should however aim to have good privacy and security because there are a large number of criminals who can misuse your data if and when they get it, so it does pay to some extent to lock the front door on all your private stuff.
It is not hopeless.
Good security and good privacy practices are worthwhile. Pay attention to them and dont make a criminal's job easy.
Also, while I am on my soapbox BACKUP YOUR DATA!
EarthSheriff
17th January 2015, 23:27
As an experiment I tried it when I was at work - and it was hopeless. Every page had some unencrypted content and none of the links were secured. (I can't add plugins to the browser at work)
Thanks Anchor, This is a very worthwhile discussion, as top techs should have a goal to create a very tight space for discussion for a subset of this group. There are backdoor's on most routers, and most everything is logged. The new DOJ rules required back doors. and now they passed CISA Cybersecurity Bill (Redsilverj) https://www.youtube.com/watch?v=jJfQ5tX1fDM during fake crisis SickCIAwood's Sony Interview INTEL false Flag event to take the heat off their torture REPORT? More on SickCIAwood "Illuminati Hypersexualization of Children Exposed! Disney Pedophilia and Satanic Rolemodels" https://www.youtube.com/watch?v=hwUwchCeeI4 More on the REAL RAPE TORTURE REPORT! 100,000+ Victims each year via ET exchange program! http://www.bibliotecapleyades.net/offlimits/offlimits_dulce08.htm :sad:
Xanth
18th January 2015, 00:18
The problem here isn't the tor network, its an exploit in adobe flash code that allows a direct connection to a web site without going through the tor network. The direct connection has the user's real ip address. Normally the key determining factor for if something is back doored is if its *NOT* open source (Tor is) - so for example anything by Microsoft and various network equipment vendors. If it is open source, backdooring the product is a lot trickier as you have to write the backdoor in such a way that its not obvious to other member of the open source project - or indeed anyone who cares to review the code - I know of at least one occasion where such an attempt was uncovered.
Further down the article it mentions another problem with the Tor network which actually turns out to be an attempt to exploit a flaw in the firefox web browser - which presumably again would reveal your true ip address. So nothing I've read suggests that Tor has been compromised - which doesn't mean to say it hasn't, it just means that the article supplies no evidence - only evidence of uncovering Tor users by exploiting things which aren't Tor. Unfortunately with network security, if you don't know what you're doing its really easy to do it wrong and not know.
Gardener
18th January 2015, 01:04
Not having used Tor because I have no requirement, I have no experience, however I did always consider it to be a collection point. The profiling of everyone is taking place through many apps and likely feeding into a comprehensive AI. Facebook has a neat app to draw you into sharing meaningful emotional preferences, by answering 5 or 6 questions it determines if you are 'whatever de jour'. Certain large website forums will be collection and data seives.
Anyway my reason for posting is that USA and Britain will be running a cyber war games drill later this year, they arranged it on Cameron's recent visit with BO, it occurred to me that we see drills going live so we may be in for an internet outage, or some other devious plot.
:focus:
Anchor
18th January 2015, 01:50
The new DOJ rules required back doors.
As I read it, it is not actually a rule, rather it is a recommendation in the form of advice, and it probably only applies to US manufacturers.
Any purchaser concerned about this needs to do due diligence and ensure that a legal representation is made from the vendor as to whether there is or is not a back door facility and also warrant that none will be included in any updates.
That said trust for US network equipment manufacturers is not exactly at an all time high at the moment and things like this don't help them any.
All this is moot though. Trust no one. When designing networks these days for security one has to assume that everything you don't control yourself is utterly compromised and design accordingly!
Anchor
18th January 2015, 02:08
The problem here isn't the tor network, its an exploit in adobe flash code that allows a direct connection to a web site without going through the tor network.
s/The problem/One of the problems/
Adobe Flash has no business being anywhere near a secure computer.
One of those tricks was a lean 35-line Flash application. It worked because Adobe’s Flash plug-in can be used to initiate a direct connection over the Internet, bypassing Tor and giving away the user’s true IP address. It was a known issue even in 2006, and the Tor Project cautions users not to install Flash
So nothing I've read suggests that Tor has been compromised - which doesn't mean to say it hasn't, it just means that the article supplies no evidence - only evidence of uncovering Tor users by exploiting things which aren't Tor.
I completely agree with your conclusion.
dim
18th January 2015, 07:18
...or a desperate attempt to discredit something they can't touch.
It's a common practice and it works
especially to new truth seeking minds eager to throw in the conspiracy fire everything they can
in order to establish a firm sense of self identity as a truth warrior.
Powered by vBulletin™ Version 4.1.1 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.