Hacking the FBI; Security experts call it "drive-by download": a hacker accesses a high traffic website and then divert visitors to deliver their malware. It is one of the most powerful tools in the arsenal of the Black Hat, capable of bringing thousands of new victims to hackers in a few minutes.
As shown, however, the technique has been adopted by a different kind hacker, a species with a signal. The last two years, the FBI quietly experimenting with drive-by hacks as a solution to tackle the serious problems of Internet: how to identify and prosecute users of banned websites behind powerful (?) Anonymity system Tor.
This approach has borne fruit, with many users of child pornography sites that are hidden behind the Tor have led t
he courts. But there is a conflict, because the Ministry of Justice "forgets" to describe the technical hacking judges, and has its use by defendants. Critics are concerned that similar techniques weaken the security and human rights defenders and activists, said that it is possible to become infected and someone innocent with malware only because government visited the wrong website. "You should listen to the Congress on this," says technologist ACLU Chris Soghoian, an expert on the use of hacking tools by law enforcement authorities. "If Congress decides that the technique is well suited, it's okay. But first let's talk about it. "
The malware used by the FBI of malware is nothing new, reports Wired. The service calls the method NIT, the "network investigative technique," or "network investigative technique," and use it at least since 2002 in cases involving child pornography, extortion, or who knows what else. Depending on the development of a NIT may be a full-featured program backdoor that gives the government access to your files, location, browsing history on web cam, computer name and your address.
Please remember, however, what is the Tor and see the relationship with the FBI.
To Tor is a free, open source allows you to surf the web anonymously. This can happen by accepting connections from the public Internet using encrypted traffic.
The system also supports the so-called hidden services specific websites which have addresses ending .onion. The access is achieved only through the network Tor, and is usually hidden services used by people who want to avoid surveillance. Some users of these services are legitimate and worthy causes - including groups of human rights activists and journalists. Of course there are hidden services for illegal activities, see Dark Net: to buy drugs, child pornography, killers for hire, and more
The law enforcement and intelligence agencies have a love-hate relationship with Tor. They can use it themselves, but when others do, the hunters. Last month, the Russian Government has offered $ 111,000 to anyone who managed to break the Tor
0 comments:
Post a Comment
We are eager to see your comment. All comments will moderate by the hand of man, and all links are nofollow.