Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Privacy Encryption The Internet News

BBC News Launches 'Dark Web' Tor Mirror (bbc.com) 41

sandbagger writes: The BBC has made its international news website available via the Tor network, in a bid to thwart censorship attempts. The browser can obscure who is using it and what data is being accessed, which can help people avoid government surveillance and censorship. Countries including China, Iran and Vietnam are among those who have tried to block access to the BBC News website or programs. Instead of visiting bbc.co.uk/news or bbc.com/news, users of the Tor browser can visit the new bbcnewsv2vjtpsuy.onion web address. Clicking this web address will not work in a regular web browser.
This discussion has been archived. No new comments can be posted.

BBC News Launches 'Dark Web' Tor Mirror

Comments Filter:
  • by LarryRiedel ( 141315 ) on Thursday October 24, 2019 @06:32PM (#59344404)
    FTFY
    • BBC is among those broadcaster, that is directly funded by a license fee and is operating completely independent of the government.
      (other random examples: Switzerland's SSR, Japan's NHK, etc.) (as opposed to France or Germany were the TV is also publicly funded by the government).

      So if the government is unhappy with how the BBC collaborates, there isn't much they can't do. They can't threaten to cut some funding down, the BBC is independent.

      So no, it's definitely not an MI6 honeypot. (at least not obviously

  • The NSA and other Five Eyes TLA agencies run many exit nodes. TOR itself has dodgy sources of funding / organisation (1). At a minimum, use Tails (2) on a USB drive on a laptop.
    1. https://surveillancevalley.com... [surveillancevalley.com]
    2. https://tails.boum.org/ [boum.org]

    • by beepsky ( 6008348 ) on Thursday October 24, 2019 @06:43PM (#59344430)
      If you knew how Tor worked you'd know that exit nodes being run by hostile actors doesn't compromise normal Tor usage, and ABSOLUTELY DOESN'T compromise hidden service usage.
      Is it too much to ask that people do a little research before spreading stupid conspiracy theories?
      • by Barny ( 103770 )

        Is it too much to ask that people do a little research before spreading stupid conspiracy theories?

        These days, sadly, yes.

        The old term "close your ears" is becoming more and more relevant again as people literally don't want to listen to anything that compromises the perfect little bubble they live in. Thanks the the wonder of modern technology, such people are easily heard by others and interpreted as experts in their field by less knowledgeable.

        Thank you for trying to fight the FUD a little.

      • by gweihir ( 88907 )

        Indeed. Most people fail at having more "insight" into these questions than some lose word association. Incidentally, Roger Dingledine is completely open about the funding (asked him at a conference about it) and he thinks that they did not understand what they were funding back then.

      • Keep up at the back!

        There are a number [wikipedia.org] of well documented & tested attacks on the Tor network. The GP could perhaps be referring to the Bad Apple Attack [wikipedia.org]:

        The "bad apple attack" exploits Tor's design and takes advantage of insecure application use to associate the simultaneous use of a secure application with the IP address of the Tor user in question. One method of attack depends on control of an exit node or hijacking tracker responses, while a secondary attack method is based in part on the statistical exploitation of distributed hash table tracking. According to the study:

        The results presented in the bad apple attack research paper are based on an attack in the wild launched against the Tor network by the authors of the study. The attack targeted six exit nodes, lasted for twenty-three days, and revealed a total of 10,000 IP addresses of active Tor users.

      • by emil ( 695 )

        Past honeypot trials caught cleartext passwords being stored and used [sophos.com], presumably by the operators of the relevant exit nodes (although the passwords were visible on the whole path from the exit node to they honeypot).

        Tor users should not:

        • - Pass cleartext credentials or sensitive data through an exit node.
        • - Run vulnerable or out of date software, as this is visible to the guard nodes.

        p.s. Hidden services (like the new BBC site) do not use exit nodes.

        • Don't exit the TOR network at all. Even then, ensure your interface (browser) doesn't try. Blacklist all non .onion domains.

    • The NSA and other Five Eyes TLA agencies run many exit nodes.

      Yeah, and so what ?

      Tor isn't your garden variety "VPN" which a single point of failure (see recent NordVPN hack allegations on /. )

      Tor relies on a circuit with multiple hops, an entity would need to be in control of both the entry and the exit node and do timing attacks (or control every single hop) in order to be able to de-anonymize your traffic. Special care is taken by the devs to keep the probability of this as low as possible.

      Also Tor is useful to protect US intelligence communications online, so *it

  • Excellent news (Score:5, Insightful)

    by beepsky ( 6008348 ) on Thursday October 24, 2019 @06:41PM (#59344418)
    Excellent news. Costs nothing, and to the people who want it, it's extremely valuable.
    Hopefully they don't change their mind and shut it down like Facebook did.
  • I wonder if it will help me get around those banners stating "This content can not be accessed from your location (despite you being a tax-paying citizen of a Commonwealth country)" whenever I try to view any show on the Beeb's website.

  • thats nice that you have tor... how about fixing problems like :

    adding IPv6 to all the websites so that mobile/cell subscribers don't have to use a proxy and can connect directly (facebook see's about 50% IPv6 traffic)
    signing your zone with DNSSEC so that people can verify that they are indeed visiting a authentic website and not redirected via MITM
    Implementing a HSTS policy so that after that first use they don't get MITM the next thing after DNSSEC...
    use X-Frame-Options X-Content-Type-Options X-XSS-Prote

  • All browsers need to support Tor .. and actually all websites need to get on it too eventually in the long term.

  • Would it kill someone at BBC if they hired a competent writer for technology writing? I mean, the difference between Deep and Dark web is 1 second away using a search engine. Even that or they expect to use their brand new version of the site to offer child pornography, narcotics exchange, military graded weapon sales or scamming people (the most usual thing) in some or all of these fields.
  • If I can't buy my cocaine there, what's the point?

    1. If you get into tor you can get outside it somewhere else, so the onion users have this BBC site already.
    2. You should isolate nodes from the local network, which means doing [1] for the user.

    So unless the "Dark Site" contains something too juicy for general public, this is an exercise at pointlessness.

God made the integers; all else is the work of Man. -- Kronecker

Working...