Forgot your password?
typodupeerror
Privacy Security The Internet

Scientists Detect Two Dozen Computers Trying To Sabotage Tor Privacy Network 94

Posted by Soulskill
from the a-few-bad-onions-spoil-it-for-the-rest-of-us dept.
New submitter fynbar writes "Computer scientists have identified almost two dozen computers that were actively working to sabotage the Tor privacy network by carrying out attacks that can degrade encrypted connections between end users and the websites or servers they visit (PDF). 'Two of the 25 servers appeared to redirect traffic when end users attempted to visit pornography sites, leading the researchers to suspect they were carrying out censorship regimes required by the countries in which they operated. A third server suffered from what researchers said was a configuration error in the OpenDNS server. The remainder carried out so-called man-in-the-middle (MitM) attacks designed to degrade encrypted Web or SSH traffic to plaintext traffic. The servers did this by using the well-known sslstrip attack designed by researcher Moxie Marlinspike or another common MitM technique that converts unreadable HTTPS traffic into plaintext HTTP.'"
This discussion has been archived. No new comments can be posted.

Scientists Detect Two Dozen Computers Trying To Sabotage Tor Privacy Network

Comments Filter:
  • by Anonymous Coward on Wednesday January 22, 2014 @04:39AM (#46033675)

    The mention in the article that there are only 1000 exit nodes generally available on TOR is kinda stunning.

    That's 20 nodes per US state.

    If that is it.... Then what is left of Freedom is in deep trouble.

  • Re: Ah c'mon (Score:2, Interesting)

    by Anonymous Coward on Wednesday January 22, 2014 @08:11AM (#46034313)

    I've seen lots of people using Tor - I run a relay - but I have no idea what they're using it for, or how legal that use is in my or their jurisdiction. Which is kind of the point.

Do molecular biologists wear designer genes?

Working...