Academic hackers: Tor de-anonymized.

AuthorDoherty, Brian
PositionCitings - Brief article

Last year the FBI gave computer-security academics an interesting lesson.

When researchers at Carnegie Mellon's Software Engineering Institute were poking around at the popular anonymity software Tor, they found vulnerabilities that allowed them to identify some Tor users who didn't want to be identified. At least one of them, Brian Farrell, was involved with a website known as "Silk Road 2.0" that arose after the feds took down the old Silk Road in 2013. Like its predecessor, this site served as an online black market.

That became more than academic, as revealed in a ruling from Judge Richard Jones during Farrell's subsequent prosecution. The FBI obtained Farrell's LP. address via subpoena to Carnegie Mellon, Judge Jones revealed. That should put some fear into computer...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT