What is Nostr?
๐•ต๐–”๐–๐–“โšกโšก ๐Ÿœ‰ โˆž/โ‚‚โ‚ ๐Ÿœš
npub1x3jโ€ฆewrm
2024-09-18 20:34:51

๐•ต๐–”๐–๐–“โšกโšก ๐Ÿœ‰ โˆž/โ‚‚โ‚ ๐Ÿœš on Nostr: That's why I want to use Tor over the vpn on Amethyst. ...

That's why I want to use Tor over the vpn on Amethyst.
#### Investigations in the so-called darknet: Law enforcement agencies undermine Tor anonymisation

***The Tor network is considered the most important tool for surfing the internet anonymously. Law enforcement agencies have apparently begun to infiltrate it in order to expose criminals. They have been successful in at least one case.***

https://www.ndr.de/fernsehen/sendungen/panorama/aktuell/Investigations-in-the-so-called-darknet-Law-enforcement-agencies-undermine-Tor-anonymisation,toreng100.html

##### Tor-Relays Mailing List Response from Isabela Fernandes

Hi Tor,

I am reaching out to inform you of an upcoming news story concerning a
potential deanonymization attack on Onion Services.

What is happening?

On September 9, 2024, The Tor Project received a press inquiry from
Norddeutscher Rundfunk (NDR, part of ARD, a German public broadcaster) with
a request for comment to their upcoming reporting of "investigative
measures by German and international law enforcement agencies in the Tor
network, in particular the localisation and deanonymisation of onion
services." We complied with the outlet's deadline of September 12th and
answered a series of questions.

The reporter claims to have "evidence that shows that in several cases
German law enforcement authorities were able to locate the Tor entry node
of onion services and thus successfully deanonymise Tor users. V2 and V3
onion addresses were affected at least between Q3/2019 and Q2/2021." The
reporter further claims that "law enforcement agencies used so-called
timing analyses and broad and long-term monitoring of Tor nodes in data
centres."

As of today, The Tor Project has not been granted access to supporting
documents, and has not been able to independently verify if this claim is
true, if the attack took place, how it was carried out, and who was
involved.

In the absence of facts, it is hard for us to issue any official guidance
or responsible disclosures to the Tor community, relay operators, and users
at this time.

We are calling for more information from you.

If you have any information that can help us learn more about this alleged
attack, please email security at torproject.org.

If you want to encrypt your mail, you can get the OpenPGP public key for
this address from keys.openpgp.org. Fingerprint: 835B 4E04 F6F7 4211 04C4
751A 3EF9 EF99 6604 DE41

Your assistance will help all of us take the necessary steps and
precautions to keep Onion Services safe for the millions of users that rely
on the protections Tor provides.

Are Tor users safe?

Tor users can continue to use Tor Browser to access the web securely and
anonymously. Nothing that the Tor Project has learned about this incident
suggests that Tor Browser was attacked or exploited. We encourage Tor
Browser users and relay operators to keep software versions up to date.

The reporter's questions focus on the use of onion services and .onion
addresses. Which leads us to assume that the alleged attack was targeting a
specific .onion site.


We will continue to share updates on this email as this situation evolves.

Thank you!

Isabela

https://lists.torproject.org/pipermail/tor-relays/2024-September/021855.html

##### Tor's Official Response

***We are writing this blog post in response to an investigative news story looking into the de-anonymization of an Onion Service used by a Tor user using an old version of the long-retired application Ricochet by way of a targeted law-enforcement attack. Like many of you, we are still left with more questions than answers--but one thing is clear: Tor users can continue to use Tor Browser to access the web securely and anonymously. And the Tor Network is healthy.***

https://blog.torproject.org/tor-is-still-safe/

#ikitao #tor #anonymity #privacy
Author Public Key
npub1x3j34yuj6d9ln5ryuw0ncy97aa6ttc5wwyxqwvjrz7mg039t6l5qd4ewrm