<p dir="ltr">FBI has basically bugged Tor via trojans and viruses. Its been on Slashdot at least once a week the past few months.</p>
<div class="gmail_quote">On Oct 5, 2013 6:53 AM, "Matt Keys" <<a href="mailto:mk6032@yahoo.com">mk6032@yahoo.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">

  
    
  
  <div bgcolor="#FFFFFF" text="#000000">
    <div>Can someone explain to me how the FBI
      (or whatever gov 3 letter acronym) "seized" a Tor domain? The Tor
      DNS resolution is supposed to be distributed to where it never
      reveals the actual location, is it not?<br>
      <br>
      
      <a href="http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29" target="_blank">http://en.wikipedia.org/wiki/Tor_(anonymity_network)</a><br>
      
      <span style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;display:inline!important;font-weight:normal;float:none;line-height:19.1875px;text-transform:none;font-size:13px;white-space:normal;font-family:sans-serif;word-spacing:0px">As of Tor release 0.2.0.1-alpha, Tor
        includes its own DNS resolver, which will dispatch queries over
        the mix network. This should close the DNS leak and can interact
        with Tor's address mapping facilities to provide the Tor hidden
        service (</span><code style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;background-color:rgb(249,249,249);font-weight:normal;line-height:19.1875px;text-transform:none;font-size:13px;white-space:normal;font-family:monospace,Courier;word-spacing:0px"><a href="http://en.wikipedia.org/wiki/.onion" title=".onion" style="text-decoration:none;color:rgb(11,0,128);background-image:none;background-repeat:initial initial" target="_blank">.onion</a></code><span style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;display:inline!important;font-weight:normal;float:none;line-height:19.1875px;text-transform:none;font-size:13px;white-space:normal;font-family:sans-serif;word-spacing:0px">) access to
        non-SOCKS-aware applications.</span><sup style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;font-weight:normal;line-height:1em;text-transform:none;white-space:normal;font-family:sans-serif;word-spacing:0px"><a href="http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#cite_note-Tor_Changelog-25" style="text-decoration:none;color:rgb(11,0,128);background-image:none;white-space:nowrap;background-repeat:initial initial" target="_blank"><span>[</span>25<span>]</span></a><br>

        <br>
        ...<br>
        <br>
      </sup><span style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;display:inline!important;font-weight:normal;float:none;line-height:19.1875px;text-transform:none;font-size:13px;white-space:normal;font-family:sans-serif;word-spacing:0px">Servers configured to receive inbound
        connections only through Tor are called hidden services. Rather
        than revealing a server's IP address (and thus its network
        location), a hidden service is accessed through its<span> </span></span><a href="http://en.wikipedia.org/wiki/.onion" title=".onion" style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;font-weight:normal;line-height:19.1875px;color:rgb(11,0,128);text-transform:none;font-size:13px;white-space:normal;text-decoration:none;font-family:sans-serif;background-repeat:initial initial;word-spacing:0px;background-image:none" target="_blank">onion address</a><span style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;display:inline!important;font-weight:normal;float:none;line-height:19.1875px;text-transform:none;font-size:13px;white-space:normal;font-family:sans-serif;word-spacing:0px">. The Tor
        network understands these addresses and can route data to and
        from hidden services, even to those hosted behind<span> </span></span><a href="http://en.wikipedia.org/wiki/Firewall_%28computing%29" title="Firewall (computing)" style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;font-weight:normal;line-height:19.1875px;color:rgb(11,0,128);text-transform:none;font-size:13px;white-space:normal;text-decoration:none;font-family:sans-serif;background-repeat:initial initial;word-spacing:0px;background-image:none" target="_blank">firewalls</a><span style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;display:inline!important;font-weight:normal;float:none;line-height:19.1875px;text-transform:none;font-size:13px;white-space:normal;font-family:sans-serif;word-spacing:0px"><span> </span>or<span> </span></span><a href="http://en.wikipedia.org/wiki/Network_address_translator" title="Network address translator" style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;font-weight:normal;line-height:19.1875px;color:rgb(11,0,128);text-transform:none;font-size:13px;white-space:normal;text-decoration:none;font-family:sans-serif;background-repeat:initial initial;word-spacing:0px;background-image:none" target="_blank">network address
        translators</a><span style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;display:inline!important;font-weight:normal;float:none;line-height:19.1875px;text-transform:none;font-size:13px;white-space:normal;font-family:sans-serif;word-spacing:0px"><span> </span>(NAT),
        while preserving the anonymity of both parties. Tor is necessary
        to access hidden services.</span><sup style="text-indent:0px;letter-spacing:normal;font-variant:normal;text-align:start;font-style:normal;font-weight:normal;line-height:1em;text-transform:none;white-space:normal;font-family:sans-serif;word-spacing:0px"><a href="http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#cite_note-torproject-hidden-28" style="text-decoration:none;color:rgb(11,0,128);background-image:none;white-space:nowrap;background-repeat:initial initial" target="_blank"><span>[</span>28<span>]</span></a><br>

        <br>
        <br>
        <br>
      </sup>On 10/03/2013 07:43 AM, Donna Appleget wrote:<br>
    </div>
    <blockquote type="cite">
      <p dir="ltr">Wonder if the feds Went after all of the drug dealers
        that sold on the silk road?</p>
      <div class="gmail_quote">On Oct 2, 2013 10:41 PM, "Stephen Kraus"
        <<a href="mailto:ub3ratl4sf00@gmail.com" target="_blank">ub3ratl4sf00@gmail.com</a>>
        wrote:<br type="attribution">
        <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
          <div dir="ltr">I'll point out real quick that the 'Silk Road
            Mastermind' attempted to hire a hitman to kill someone
            complaining about his business.<br>
            <br>
            <a href="http://www.slate.com/blogs/crime/2013/10/02/ross_william_ulbricht_maryland_indictment_the_alleged_silk_road_mastermind.html" target="_blank">http://www.slate.com/blogs/crime/2013/10/02/ross_william_ulbricht_maryland_indictment_the_alleged_silk_road_mastermind.html</a><br>

          </div>
          <div class="gmail_extra"><br>
            <br>
            <div class="gmail_quote">On Wed, Oct 2, 2013 at 10:14 PM,
              William Roush <span dir="ltr"><<a href="mailto:william.roush@roushtech.net" target="_blank">william.roush@roushtech.net</a>></span>
              wrote:<br>
              <blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><a href="http://arstechnica.com/security/2013/10/silk-road-mastermind-unmasked-by-rookie-goofs-complaint-alleges/" target="_blank">http://arstechnica.com/security/2013/10/silk-road-mastermind-unmasked-by-rookie-goofs-complaint-alleges/</a><br>

                <br>
                Welp.<span><font color="#888888"><br>
                    <br>
                    -- <br>
                    William Roush<br>
                    <br>
                    <br>
                    _______________________________________________</font></span><br>
              </blockquote>
            </div>
          </div>
        </blockquote>
      </div>
    </blockquote>
    <br>
  </div>

<br>_______________________________________________<br>
Chugalug mailing list<br>
<a href="mailto:Chugalug@chugalug.org">Chugalug@chugalug.org</a><br>
<a href="http://chugalug.org/cgi-bin/mailman/listinfo/chugalug" target="_blank">http://chugalug.org/cgi-bin/mailman/listinfo/chugalug</a><br>
<br></blockquote></div>