The Tor Project

Discussion in 'General Discussion' started by A.O.T.F, Jan 22, 2015.

  1. A.O.T.F Member

  2. The Wrong Guy Member

    Internet Regulators Just Legitimized The Dark Web | Motherboard

    The so-called dark web is often mistakenly believed to be just an unsanctioned space of the internet that hosts dingy, illegal websites. But in reality, it’s home to websites such as Facebook, and countless whistleblower platforms hosted on the privacy-protecting and anonymizing Tor network.

    On Wednesday, thanks to newly announced decisions by internet regulators, these sites are getting some official recognition, and will be able to more easily offer better security to their users.

    The Internet Assigned Numbers Authority (IANA) — a department within the organization that oversees the domains of the internet known as the Internet Corporation for Assigned Names and Numbers (ICANN) — along with the Internet Engineering Task Force (IETF), designated the .onion domain, used for sites hosted on the Tor network, as a “Special Use Domain,” giving it an official status that it previously lacked.

    With this change, the IETF and IANA “recognize that there are legitimate reasons to use the Tor anonymity network and its hidden services,” Runa Sandvik, a security researcher who has worked with the Tor Project in the past, told Motherboard in an email.

    Continued here:

    .onion | IETF Blog

    As part of the IETF standards process, our steering group (IESG) recently approved ‘The .onion Special-Use Domain Name’ (draft-ietf-dnsop-onion-tld-01.txt) as a Proposed Standard. Because this might garner attention beyond the usual standard actions, I wanted to briefly summarize some points of the process to date, and share an outcome of the IESG’s discussion that suggests possible future IETF work.

    As the technical summary that accompanied the announcement to the IETF community indicated, the approved document uses the Special-Use Domain Names registry established by RFC 6761 to register ‘.onion’ as a special-use name. In effect, ‘.onion’ will be treated in the same way .local, .localhost, and .example have been dealt with previously — that is, outside the global Domain Name System (DNS). Adding .onion to the Special-Use Domain Names registry will also enable hosts on the Tor network to obtain validated SSL certificates.

    Continued here:
    • Like Like x 3
  3. The Wrong Guy Member

    Library Suspends Tor Node After DHS Intimidation | Electronic Frontier Foundation


    The Kilton Public Library in Lebanon, New Hampshire, is not unusual in its commitment to the freedom to read in privacy. That commitment is shared by libraries all over the world, and written into the basic character of librarianism through documents like the American Library Association's “Freedom to Read Statement.” What's exceptional about Kilton, though, is it was selected by the Library Freedom Project and The Tor Project as the pilot location for a program to install Tor relays, and eventually exit nodes, in public libraries all over.

    Libraries and Tor are a great match: Tor's software can help provide the technological underpinnings for the privacy and intellectual freedom that libraries seek to foster, and libraries can provide the institutional support that can make long-lived high-bandwidth nodes possible.

    But that effort has attracted some powerful critics: just days after Kilton announced its participation in the program, a regional Department of Homeland Security office contacted the local police to spread fear, uncertainty, and doubt about Tor. The police got in touch with the library board, who suspended the program until they could vote on it on September 15.

    Nima Fatemi, a Tor core developer and one of the originators of the libraries program, explained why libraries should stand up to that kind of law enforcement intimidation: “Libraries are one of the few entities around the world that actually care about freedom of speech and it's one of the core values of Tor.”

    Fatemi is right about the link between libraries and freedom of speech—librarians have consistently been at the forefront of many important First Amendment battles. It's one reason EFF took the unusual step of honoring “Librarians Everywhere” with a Pioneer Award in 2000.

    It's important that the library board hears from people who actually understand and value those qualities in an important privacy-enhancing tool like Tor. To that end, EFF joined a long list of signatories on a letter of support to the board, encouraging them to stand up for librarian ideals and reinstate the Tor relay.

    And they need to hear from you, too. We've set up a page to allow members of the public to sign a statement of support, which our allies in the Library Freedom Project and The Tor Project will deliver to the September 15 meeting. Over 1,500 people have already signed — please lend your voice to that effort today.

    Continued here:
    • Like Like x 2
  4. The Wrong Guy Member

    The report quoted above has been updated.

    Update September 15, 2015: The Kilton Library board has met and, after hearing from Tor supporters in the community and the 4,314 people who signed our petition, have unanimously opted to reinstate the library's relay. Congratulations to the activists from the Tor Project and the Library Freedom Project who've worked on this effort.
    • Like Like x 2
  5. A.O.T.F Member

    A truly massive achievement.
  6. A.O.T.F Member

    Mapping How Tor’s Anonymity Network Spread Around the World


    Online privacy projects come and go. But as the anonymity software Tor approaches its tenth year online, it’s grown into a powerful, deeply-rooted privacy network overlaid across the internet. And a new real-time map of that network illustrates just how widespread and global that network has become.

    On Friday, freelance Sydney-based coder Luke Millanta launched Onionview, a web-based project that counts and tracks the geographic location of Tor nodes, the volunteer computers that bounce encrypted traffic around the web to offer Tor users anonymity. His goal, in part, was to show the network’s scale and how much it’s grown. “People think that Tor is 10 people running computers in their basements,” Millanta says. “When people see the map, they say ‘Holy shit. That’s what 6,000 nodes around the world looks like.'”

    Millanta’s map also makes it possible to compare which countries host the largest chunks of the Tor network. Despite Tor’s origins as a research project at the US Navy and later at MIT, privacy-loving Germany has overtaken the US in total nodes, with France, the Netherlands, and Russia coming close behind. Here’s a breakdown of the nodes by country:

    1. Germany: 1,364
    2. United States: 1,328
    3. France: 714
    4. Netherlands: 472
    5. Russia: 270
    6. United Kingdom: 261
    7. Sweden: 210
    8. Canada: 209
    9. Switzerland: 148
    10. Romania: 117

    Onionview’s visualization also captures just how much Snowden’s NSA surveillance revelations swelled Tor’s footprint: Five years ago, the network consisted of less than 2,000 nodes, compared with 6,425 today. Even in 2012, Snowden’s leaked NSA documents showed that the agency was having trouble identifying Tor users. With thousands of more turns now in the network’s global maze, tracking Tor users online is likely harder than ever.

    Source -

    • Like Like x 3
  7. furball Member

    Interesting news. Thank you for this.
  8. John Duff Member

    Country            Nodes Population Population/Node
    4. Netherlands:     472  17000000   36017
    7. Sweden:          210  10000000   47619
    9. Switzerland:     148   8000000   54054
    1. Germany:        1364  81000000   59384
    3. France:          714  67000000   93838
    10. Romania:        117  20000000  170940
    8. Canada:          209  36000000  172249
    2. United States:  1328 321000000  241717
    6. United Kingdom:  261  64000000  245211
    5. Russia:          270 144000000  533333
    Good guy Netherlands.
  9. furball Member

    A.O.T.F, I f***ing love you for sharing this! I'm working on a search tool that this may fit into nicely. Thank you .
  10. Die.
    Berserker Dr.
    This message by Berserker Dr. has been hidden due to negative ratings. (Show message)
    • Dislike Dislike x 4
  11. Anon De Plume Member

    We need more, not less democracy

    Jacob Appelbaum

    I hope you'll join me in installing free software for freedom, fighting against mass surveillance, and refusing to be instrumentalised by those who have failed us – our intelligence services.


    This article is taken from Jacob Appelbaum's opening remarks at the World Forum for Democracy 2015.

    We are speaking here in a very intense context. I feel very sorry for what has happened in Paris and in Beirut, and for the context that seems to have taken American wars and brought them to European soil.

    With that said, the responses that I have seen have been terrifying, and not merely in the technological realm. And while I am a technologist, I am also a human being, and I refuse to be pigeon-holed into merely speaking about technology.

    Some of the things that I have heard raised for me a great deal of historical terror, and I wish to say, especially to the people who are here, who are European residents like I am now, that I encourage you to learn from the mistakes of my country, in the wake of our most recent, horrific, terrorist attack.

    I feel that we have responded with wars, and because those wars have come to your doorstep, we actually see grave interventions with more violence, which in fact feed into what Daesh wants. Daesh wants to have more war.

    They want to eliminate the grey zone where anyone with a beard, anyone who is a Muslim, anyone who looks different, will be treated as an outsider and will be harmed. They want to enlargen the xenophobia, they want more violence, and so we should consider whether or not that is what we wish.

    We also see that the intelligence services have absolutely failed us. The intelligence services of the world claim that encryption is a problem. But the evidence has come out that, in fact, the attacks in Paris were perpetrated by people who used credit cards in their real name, who used unencrypted text messages to say things like 'let’s go'

    Moar ...
  12. A.O.T.F Member

    The reason I am posting this article in it's entirety ........ This member-only article was unlocked for you by Paul Carr. Unlock expires 1 day, 13 hours from now.

    I am posting this article in the interests of fair play and the freedom of speech. That being said, I have, and will always have a major problem with this particular author and his agenda.

    Tor Project: The super secure anonymity network that will definitely keep you safe (as long as hackers don't break the rules)


    BERLIN — It’s about 11 pm and I’m sipping a beer in Room 77, a trendy cyber-libertarian bar famous for being the world’s first bar to accept bitcoins — at least according to the bar’s proprietor.

    Looking around, I can see this place is serious about its bitcoins. A neon B sign hangs in the window, while an electronic marquee over the bar flashes the current bitcoin market value — $419.10. The walls are plastered with all sorts of libertarian bitcoin propaganda. Stuff like: “I Believe in Honest Money: Gold, Silver and Bitcoin” and “Debt Is Over.” A giant poster voices solidarity with the Tor Project’s infamous martyr. “Free Ross Ulbricht,” it declares.

    I take a big gulp of my beer and take out my notebook. This is the perfect place to sit down and collect some of the thoughts I’ve had about the Tor Project, the super “secure” Internet anonymity tool that’s endorsed and promoted by Edward Snowden.

    A lot has happened to Tor since I last reported on it, and I can’t say that any of it particularly good.

    First the crowdfunding campaign. In December, Tor launched an ambitious crowdfunding campaign to, in the words of Tor’s co-founder Roger Dingledine, “become more sustainable financially and less reliant on government funding.” The campaign lined up an impressive procession of counter-culture celebrities, including Laura Poitras and Molly Crabapple. It’s also featured a bizarre donation-doubling challenge from a real live cyber-libertarian rabbi, who explained his decision to generously match people’s donations to Tor up to $18,000 in politico-religious terms: "The internet cannot heal itself in the face of tyrants," said Rabbi Rob Thomas. "Tor is the salve that heals that wound; Tor is what allows us to route around tyranny.”

    It’s not clear how much cash this crowdfunding campaign reeled in so far. What is clear is that Tor’s pleas for help from the public come at a very awkward time for the organization.

    The reason? Tor was officially forced to admit that it was basically useless at guaranteeing anonymity— and that it required attackers against the Tor network to behave with “ethics” in order for it to remain secure.

    First a a bit of background.

    Back in 2014, I published several articles that explored the conflicted history and relationship between Tor and various branches the US National Security State. Tor had always maintained that it was funded by a “variety of sources” and was not beholden to any one interest group. But I crunched the numbers and found that the exact opposite was true: In any given year, Tor drew between 90 to 100 percent of its budget via contracts and grants coming from three military-intel branches of the federal government: the Pentagon, the State Department and an old school CIA spinoff organization called the BBG.

    Put simply: the financial data showed that Tor wasn’t the indie-grassroots anti-state org that it claimed to be. It was a military contractor. It even had its own official military contractor reference number from the government.

    In 2004, Tor’s co-founder Roger Dingledine admitted that he worked for the federal government: “I contract for the United States Government to built anonymity technology for them and deploy it,” he said back then. Now, 10 years later, not much has changed.

    The tight-knit cyber-libertarian community surrounding Tor was not ready for such honesty. They answered my reporting with a vicious smear and harassment campaign against me, as well as my colleagues at Pando. We were called neo-Nazis, CIA agents, and child rapists. Tor contractors — people drawing six figure salaries from Pentagon funds — called for my death. The Anonymous movement joined in the attacks. The harassment widened beyond me to include regular readers and social media users — anyone who had the nerve to discuss and question Tor’s military and intel funding. Tor went so far as to dox an anonymous Twitter user — exposing his real identity and contacting his employer in the hopes of getting him fired. The campaign was ferocious. Its aims were clear: to discredit my reporting and discourage anyone from questioning the official Tor story. As ZDNet wrote at the time: Tor's feral fans are its own worst enemy.

    While this harassment was going on, the Tor Project came out with a technical defense that was supposed to invalidate my reporting. The official line was that it didn’t matter where Tor got its funding. The reason? Because of math — math and open source software.

    Tor was open source and powered by math, which made Tor infallible and nullified anything and everything that the powerful US surveillance state threw at it — including its deeply conflicted military funding.

    Micah Lee, The Intercept’s technologist and former EFF security whiz who helped Edward Snowden communicate securely with Laura Poitras and Glenn Greenwald, outlined this thinking in a post called “Fact-checking Pando’s smears against Tor.” Aside from making a ridiculous accusation that my reporting was driven a malicious desire to harass female Tor developers, Lee conceded that my facts about Tor’s military and intel funding were right. But he argued the facts didn’t matter:

    …of course funders might try to influence the direction of the project and the research. In Tor’s case this is mitigated by the fact that 100% of the scientific research and source code that Tor releases is open, that the crypto math is peer-reviewed and backed up by the laws of physics.

    Yep, that’s right. Tor might be a Pentagon contractor funded almost entirely by the NatSec State, but it doesn’t matter because Tor runs on “scientific research” and “the laws of physics” — you know, like gravity ‘n stuff.

    Writing here in Pando, Quinn Norton echoed the same argument with more eloquence — and none of the smears:

    I want to say immediately that when Yasha Levine went looking at the project's funding, he was following a tradition of vital and good journalism. "Follow the money" is a maxim of investigation that will rarely lead you wrong, especially in matters of political policy. There are only a few places where funding can't influence the contents of the outcome – maybe fundamental physics, and math, and not much else.

    Math is as far from policy as human endeavor gets. Math either works or it doesn't work, and that is true for everyone in this galactic cluster, at the very least. What makes Tor different from the usual thesaurus-full of government projects is that Tor is essentially a very elaborate math trick, using layers of math puzzles to create a network-within-the-network. That math is being implemented in front of a global audience of millions of sophisticated watchers. It is likely the most examined codebase in the world. It has been subjected to multiple public audits. The math, well known and widely standardized, will work for everyone, or it will not, whoever pays the bills.

    In short: Tor is above conflict of interest. It is above institutional capture, corruption, job security, careers, mortgages, car payments, food and all the other icky human elements that silently influence us mere mortals. Tor is pure math.

    This argument was repeated so often and came from so many different quarters that you could forgive people for believing it.

    But last month, this whole facade came crumbling down, and forced Tor to admit that it needs something else to run securely: trust and ethics from people who might want to hack it.

    In November, Vice’s Motherboard dropped a bomb. It reported that small group of researchers at Carnegie Mellon University had figured out a cheap and easy way to crack Tor’s super-secure network with just $3,000 worth of computer equipment, and that this information was then used by the FBI to mount an international raid that punched holes in Tor’s defenses and shutdown several hundred anonymous drug and kiddie porn markets.

    Tor’s Roger Dingledine lashed out at the Carnegie-Mellon University researchers, accusing them of selling their ethics to the FBI.

    The Tor Project has learned more about last year's attack by Carnegie Mellon researchers on the hidden service subsystem. Apparently these researchers were paid by the FBI to attack hidden services users in a broad sweep, and then sift through their data to find people whom they could accuse of crimes,” wrote he wrote, accusing the researchers of taking $1 million from the FBI. “Such action is a violation of our trust and basic guidelines for ethical research. We strongly support independent research on our software and network, but this attack crosses the crucial line between research and endangering innocent users.

    It was weird to see Tor get angry at researchers for taking government funding. After all, Tor is a military and intelligence contractor that gets 90 percent of its budget from US military and intelligence agencies.

    But Tor did something even weirder: it published a guideline for people who might want to crack or hack Tor — so that, you know, they would hack Tor ethically and with a clear conscience.

    Research on humans' data is human research. Over the last century, we have made enormous strides in what research we consider ethical to perform on people in other domains. For example, we have generally decided that it's ethically dubious to experiment on human subjects without their informed consent. We should make sure that privacy research is at least as ethical as research in other fields.

    Tor’s ethical hacking guide was very detailed. It included guidelines like: 
“Only collect data that is acceptable to publish” and “Only collect as much data as is needed: practice data minimization.” It was all very interesting and proper. I just hope they cc’ed a copy of the guide to the NSA — and bcc’ed Russian, Chinese, French and British intelligence agencies as well. They’re all trying to hack Tor, and I’m sure they’re all willing to comply.

    Tor’s supposed to be an iron-clad Internet privacy system. So all this talk about ethics and trust in Tor “research” must come as an alarming surprise to Tor’s dedicated fan base. In particular: all the crypto-libertarians who’ve been naive enough to buy into Tor’s sales pitch and launched highly illegal internet businesses peddling drugs, assassinations, child porn and guns.

    Interestingly, while Tor supporters called on CMU to investigate these researchers for violating academic research guidelines, there were no such calls for holding the Tor Project accountable for making false claims about the safety of using Tor to break the law.

    There have been plenty of people dumb enough to believe Tor — and some of them have paid for it with their freedom. Just ask Ross Ulbricht, proprietor of Silk Road, who’s smiling down at me right now from a poster on the other side of the bar. Ulbricht will probably spend the rest of his life behind bars. To some he’s a martyr. To me, he’s a sad example of what happens when you mix toxic libertarian ideology, military technology and the snake oil promises of techno-liberation.

    The Tor Project is looking to clean up its act by hiring a high profile executive director: Shari Steele, who ran EFF for more than a decade and is highly connected in Silicon Valley and Washington DC. But even this high level management shakeup won’t fix the core problem of the Tor Project: that it runs on deception, false promises and heaps of libertarian bullshit. If anything, this new hire will only make it worse.

    But that’s it for now. Time to call it a night.

    I’m slowly making my way to Hamburg to attend 32c3, the annual Chaos Computer Club conference. Think of 32c3 as the Hacktivists’ Davos — a place where the Tor Project reigns supreme, and where I am definitely not welcome. More on that very soon.
    • Like Like x 2
  13. A.O.T.F Member

  14. A.O.T.F Member

    My #TA3M talk on Tor, Onion Services, and why browser plug-ins and VPNs don’t protect your privacy


    This presentation was given at the University of Washington on January 18, 2016 and is publicly available on Google Docs. If I get worthwhile feedback, I will update the presentation. Like the rest of my blog, the presentation and images are CC-BY. I will include the images at the end of this article (pending).

    This quote is from Edward Snowden, from October 2015, via Micah Lee’s interview from The Intercept.
    This talk is for everyone. You don’t need to be an activist, journalist or a lawyer to have to need Tor. Even the most boring, uninteresting person in the world should be defending their rights to privacy and freedom of expression by using Tor.

    The aim of this ~30 minute talk (plus Q/A) is to help make understanding of Tor and Onion Services easier. It is not a highly technical talk, but it is technical. I expect that users that wish to gain knowledge of how technical systems work, to take advantage of them, must learn technical material.

    The talk discusses how the Tor network works to protect your privacy by juxtaposing plain HTTP, HTTPS, and also mainstream VPN technology. I will be discussing why the advertising industry is an even greater threat than even the NSA (to most people) and why VPNs just can’t cut it. Lastly, I will discuss how Onion services is a paradigm shift from standard client-server communications, how it works to protect your privacy, and why Onion services is an important application for service providers concerned about uptime and security.

    Continued -
  15. A.O.T.F Member

    Tails 2.0 is out

    We are especially proud to present you Tails 2.0, the first version of Tails based on:

    GNOME Shell, with lots of changes in the desktop environment.
    Debian 8 (Jessie), which upgrades most included software and improves many things under the hood.

    This release fixes many security issues and users should upgrade as soon as possible.
  16. The Wrong Guy Member

    Ricochet — Most Secure Peer-to-Peer Encrypted Messenger that Sends No Metadata

    Ricochet is a peer-to-peer instant messaging system available for Windows, Mac, and Linux, and you can trust it as the app has already cleared its first professional security audit carried out by cyber security company NCC Group.

    Unlike other encrypted messaging clients, Ricochet makes use of TOR hidden services in an effort to maintain its users’ anonymity.

    With the help of hidden services, a user's traffic never leaves The Onion Router (TOR) network, which makes it much harder for prying eyes or any attacker to see where the traffic is going or coming from.

  17. DeathHamster Member

  18. The Wrong Guy Member

    There's a related post here:

    Supreme Court Gives FBI More Hacking Power

    The rule change, sent in a letter to Congress on Thursday, would allow a magistrate judge to issue a warrant to search or seize an electronic device regardless of where it is, if the target of the investigation is using anonymity software like Tor to cloak their location. Over a million people use Tor to browse popular websites like Facebook every month for perfectly legitimate reasons, in addition to criminals who use it to hide their locations.
    • Like Like x 1
  19. Anonymous Member

    Well that's fucking cute.
  20. Fuck that shyte, I have i 7 Hexacore processor so fuck you all.
  21. The Wrong Guy Member

    Tor Project, a Digital Privacy Group, Reboots With New Board | The New York Times


    The Tor Project, a nonprofit digital privacy group, on Wednesday replaced its board with a new slate of directors as part of a larger shake-up after allegations of sexual misconduct by a prominent employee.

    The Tor Project promotes the use of software that helps internet users mask their online identities and whereabouts; the software was developed by the United States Naval Research Laboratory nearly 20 years ago. The group has become better known in the last few years, as Tor is regarded as a useful tool to evade online tracking and government surveillance.

    But the Tor Project has been plagued by controversy, most recently involving allegations of sexual misconduct by Jacob Appelbaum, the 33-year-old public face of Tor, who was asked to step down from the group in May.

    Last December, the Tor Project appointed a new executive director, Shari Steele, partly to help restructure the group. She had previously spent 15 years as the executive director of the Electronic Frontier Foundation.

    Mr. Appelbaum has dodged allegations of inappropriate sexual conduct for years, and was suspended for two weeks last spring because of accusations of harassment. In May, new revelations of sexual misconduct emerged, and Ms. Steele led a push for Mr. Appelbaum’s resignation. She said the Tor Project had been working with an independent investigator to look into the claims.

    Mr. Appelbaum denied the accusations. In a statement last month, he said: “I want to be clear: The allegations of criminal sexual misconduct against me are entirely false.” His publicist did not respond to further requests for comment.

    After the controversy, all seven of Tor’s board members agreed to give up their seats to make room for a new slate. In a joint statement on Wednesday, they said, “It is time that we pass the baton of board oversight as the Tor Project moves into its second decade of operations.”

    The new board is part of Ms. Steele’s broader restructuring as she seeks to promote the legitimacy of the Tor Project. Apart from dealing with the allegations over Mr. Appelbaum, the organization has also struggled to fend off an image as a “Dark Web” tool used by drug dealers and pedophiles. An official from the Justice Department recently incorrectly cited a statistic claiming 80 percent of traffic on the Tor network involved child pornography. That statistic, however, came from a study involving a separate service, Tor Hidden Services, which accounts for less than 2 percent of all Tor traffic.

    Since taking the Tor Project’s helm, Ms. Steele has replaced its directors of human resources and administration, moved the project’s base of operations to Seattle from Cambridge, Mass., recruited the new slate of directors, and searched for additional, alternative sources of funding.

    Tor has received funding from private companies and nonprofits, including Google and Human Rights Watch, but 90 percent of its funding comes from government contracts and grants. That is a controversial source of funds for an organization that counts dissidents and activists looking to avoid government reprisals among its primary user base.

    In an interview, Ms. Steele said the board moves were intended to “bring in a strong, leadership-oriented board with more experience leading a strong and sustainable organization.” Recruiting new members, she said, had not been a challenge.

    “All of them had been watching what was going on with Tor and were committed and enthusiastic about growing this into a stronger and sustainable organization,” she said.

    The departing directors are Meredith Hoban Dunn, Ian Goldberg, Julius Mittenzwei, Rabbi Rob Thomas, Wendy Seltzer and two of Tor’s co-founders, Roger Dingledine and Nick Mathewson. Mr. Dingledine and Mr. Mathewson will remain as leaders of Tor’s technical research and development.

    Their successors include Matt Blaze, a widely known cryptographer and associate professor at the University of Pennsylvania; Cindy Cohn, Ms. Steele’s successor as executive director at the Electronic Frontier Foundation; Bruce Schneier, a security author and expert; Gabriella Coleman, an anthropologist at McGill University who writes about online activism; Linus Nordberg, a longtime internet and privacy activist; and Megan Price, executive director of the Human Rights Data Analysis Group. The remaining board seat has yet to be filled.

    • Like Like x 1
  22. The Wrong Guy Member

    The Administrator of the Dark Web's Infamous Hacking Market Has Vanished

    By Joseph Cox, Motherboard, August 3, 2016


    The Real Deal market, a dark web site that specialises in stolen data and computer exploits, shot to infamy this year thanks to its role in the sale of information from several massive data breaches, including Myspace and LinkedIn. But a few weeks ago, the market's main administrator vanished, and has not logged into their chat accounts for over 40 days.

    “This [is] very strange by just leaving the market like this without any management or any notice for leaving,” the hacker known as Peace, who has sold many large-scale data dumps on The Real Deal, told Motherboard in an online chat.

    The Real Deal has been around since early 2015, when it filled an apparent gap in the dark web economy: While most marketplaces were focused on drugs, weapons, or perhaps stolen credit cards, The Real Deal claimed to sell computer exploits and became a go-to location for stolen login credentials and other hacked data.

    The admin was last heard from around June 23.

    The site has previously faced setbacks and mysterious ongoings. In July of last year, the market went offline, only to reappear two weeks later with the owner telling Motherboard at the time that he was “the only free admin right now.” He said the site had three administrators in all, and that they had all been arrested during raids around another cybercrime hub called Darkode.

    Then this summer, The Real Deal received widespread attention when Peace used it to sell data from several so-called “mega breaches.” This week, Yahoo said it was investigating after the hacker advertised details for 200 million of the company's customers.

    Continued here:
  23. The Wrong Guy Member

Share This Page

Customize Theme Colors


Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins