Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Crime Security

Drug Case In Ireland Has Fingerprints of Carnegie Mellon's Attack On Tor 72

blottsie writes: Newly released evidence shows that Irish detectives who worked the case of two convicted drug dealers may have also used data obtained through CMU's Software Engineering Institute's methods. Mannion and O'Connor were arrested on Nov. 5, 2014, according to a database of Dark Net arrests created by independent researcher Gwern Branwen. That's the same day that the owner of Silk Road 2.0, the replacement for the infamous drug marketplace Silk Road, was arrested. The IP addresses of Silk Road 2.0 were provided to the FBI by a "source of information," according to a search warrant in another case impacted by the attack on Tor, which court documents later confirmed was a university-based research institute.
This discussion has been archived. No new comments can be posted.

Drug Case In Ireland Has Fingerprints of Carnegie Mellon's Attack On Tor

Comments Filter:
  • Weed... (Score:1, Offtopic)

    by Frosty Piss ( 770223 ) *

    By the way, in Washington (where I live), Colorado, and very soon Oregon, you can buy weed in regulated stores in shopping malls and downtown hipster hangouts, take it home and toke to your heart's content, and answer the door to a cop who will tell you to turn your music down and then go away.

  • An Irish narcotics trafficking site will presumably involve some jail time for those involved; but at least the tax burden will be among the lightest in the EU!
  • So, where to now? (Score:5, Interesting)

    by RuffMasterD ( 3398975 ) on Tuesday December 22, 2015 @08:12AM (#51164343)
    Looks like this genie is out of the bottle, and the temptation will simply be too great for law enforcement to let it back in. Tor is compromised. What can we do now? Can Tor be improved to mitigate such attacks, or to warn users in real time that an attack is happening? Are there alternative systems that are not known to have been compromised yet?

He's dead, Jim.

Working...