FBI Admits It Controlled Tor Servers
11 years ago | 6381 Views
FBI Controlled Freedom Hosting Tor Servers
The FBI has admitted to taking control of Freedom Hosting servers on the anonymity network Tor right before researchers uncovered an interesting piece of malware specially designed to identify users.
Freedom Hosting was a provider of turnkey “Tor hidden service” sites - special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network.
Click on the link below to read more:
http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/
The FBI has admitted to taking control of Freedom Hosting servers on the anonymity network Tor right before researchers uncovered an interesting piece of malware specially designed to identify users.
Freedom Hosting was a provider of turnkey “Tor hidden service” sites - special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network.
Click on the link below to read more:
http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/
0
Tags: FBI, Tor Servers, Freedom Hosting
Comments
secnews's iBlogs
What iBlog
-
RCSAndroid - one of the most professionally developed and sophisticated Android malware
Posted: 2015 July 23 | 7410 Views -
Boeing subsidiary Insitu would like to be able to deliver spyware via drone
Posted: 2015 July 20 | 5807 Views -
Mobile Spy Software Maker mSpy Hacked
Posted: 2015 May 17 | 16771 Views -
Critical “Ghost” Remote Code Execution Vulnerability
Posted: 2015 February 01 | 9179 Views -
Awful things are what happens
Posted: 2015 January 16 | 6888 Views -
Four in 10 Americans face regular online fraud attacks
Posted: 2014 October 24 | 10097 Views -
The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows
Posted: 2014 October 16 | 10748 Views -
The NSA Gets an OK for Telephony Metadata Collection Yet Again
Posted: 2014 July 09 | 10742 Views -
Yet another wave of digital destruction is coming
Posted: 2014 March 02 | 11902 Views -
Internet Monitoring and Brand Protection
Posted: 2014 January 13 | 9236 Views -
Computer Threat 3rd Quarter 2013 McAfee Report
Posted: 2013 November 20 | 6432 Views -
NSA: The Future Of Cloud Computing In U.S.
Posted: 2013 October 23 | 7590 Views -
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail
Posted: 2013 October 15 | 17320 Views -
New Intel Chips Contain Back-Door Processor
Posted: 2013 September 23 | 7949 Views -
New Version of ESET Social Media Scanner
Posted: 2013 September 17 | 6593 Views -
Trend Micro warns of new spam campaign
Posted: 2013 September 16 | 7313 Views -
FBI Admits It Controlled Tor Servers
Posted: 2013 September 16 | 6381 Views -
Latest Java update will block exploits
Posted: 2013 September 16 | 6438 Views
Categories
Tags iBlog
Mujuru Sex Protection Oem software downloadable software Slimming Zulu Xenophobia Land Women Bitches Izibongo Antivirus computer security Warning Sress Cannabis Jail Html Outlook pst file repair tools Gaming gaming laptop indian market notebook Tsvangirai Ios android Microsoft ipad surface tablet Mugabe Business gadgets mobile software