--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Uhm, no. That's oversimplified.
Like someone said earlier. Only a few people arrested, but many sites
down. Seems plausible that a clique of drug sellers got
infiltrated/hacked and got their many darknet sites identified from
the inside.
There is no "regardless of how it is actually done".
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Maybe, if i may pop in, it's just all about an user exploit and the money (
bitcoin ) travel.
Remember, 85% of user systems are MS based, and we all do know that this system
was not built with privacy for the user mind.
If I can watch what my "zomb
> http://www.bbc.com/news/technology-29950946
>
> Does anyone know if this was user or operator error, or
> vulnerabilities in application used that the FBI know about and are
> actively exploiting? Basically does anyone how they managed to take
> so many 'hidden' services?
>
> I can't believe th
On Fri, 2014-11-07 at 12:52 +, spaceman wrote:
> I can't believe that 400 sites all made stupid mistakes thus revealing their
> identity. Therefore they must have had an exploit that they are using to take
> down all these sites (either in tor or some other application).
The article claims
Hi,
http://www.bbc.com/news/technology-29950946
Does anyone know if this was user or operator error, or vulnerabilities in
application used that the FBI know about and are actively exploiting?
Basically does anyone how they managed to take so many 'hidden' services?
I can't believe that 400
From: "Adrian Crenshaw"
> I can send you the pptx offlist.
>
> Thanks,
> Adrian
>
Got it - Thanx !
--
Dave
Multi-AV Scanning Tool - http://www.pctipp.ch/downloads/dl/35905.asp
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.
I can send you the pptx offlist.
Thanks,
Adrian
On Fri, Jun 24, 2011 at 2:24 PM, David H. Lipman wrote:
> From: "Adrian Crenshaw"
>
> > I've been working on my common Darknet Weaknesses slides for AIDE
> and
> > Defcon. Any feed back on sample animations/things to add? Keep in mind I
> > o
From: "Adrian Crenshaw"
> I've been working on my common Darknet Weaknesses slides for AIDE and
> Defcon. Any feed back on sample animations/things to add? Keep in mind I
> only have about 50min to speak. First network animations are at about 50 sec
> in.
>
> http://youtu.be/UoXk-Nx6spw?hd=1
I've been working on my common Darknet Weaknesses slides for AIDE and
Defcon. Any feed back on sample animations/things to add? Keep in mind I
only have about 50min to speak. First network animations are at about 50 sec
in.
http://youtu.be/UoXk-Nx6spw?hd=1
I plan to make more changes, and in
10 matches
Mail list logo