20110617

A Primer on Wikileaks Espionage on TOR Exit Nodes

Tor-security-model

"In 2007, Dan Egerstad, Swedish security researcher, exposed how the
Tor network could easily be used for intelligence gathering: [1]

``Dan Egerstad is a Swedish security researcher; he ran five Tor
nodes. Last month, he posted a list of 100 e-mail credentials --
server IP addresses, e-mail accounts and the corresponding
passwords -- for embassies and government ministries around the
globe, all obtained by sniffing exit traffic for usernames and
passwords of e-mail servers.''

Note that this was not a case of embassy staff using Tor to access
their own email accounts, which is absurd. This was a case of
blackhat hackers (or intelligence) using Tor to anonymously access
the compromised accounts. In fact, Egerstad states that the Iranian
government contacted him to thank him for having uncovered the
otherwise unknown compromise..."

http://pgpboard.com/viewtopic.php?f=2&t=458

No comments:

Post a Comment