this post was submitted on 30 Aug 2024
162 points (92.2% liked)

Privacy

32004 readers
1042 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

All the recent dark net arrests seem to be pretty vague on how the big bad was caught (except the IM admin's silly opsec errors) In the article they say he clicked on a honeypot link, but how was his ip or any other identifier identified, why didnt tor protect him.

Obviously this guy in question was a pedophile and an active danger, but recently in my country a state passed a law that can get you arrested if you post anything the government doesnt like, so these tools are important and need to be bulletproof.

(page 2) 20 comments
sorted by: hot top controversial new old
[–] [email protected] 10 points 2 months ago

Reminds me of a few different darknet diaries episodes. https://darknetdiaries.com/transcript/24/

[–] [email protected] 60 points 2 months ago (2 children)

There are many ways your real IP can leak, even if you are currently using Tor somehow. If I control the DNS infrastructure of a domain, I can create an arbitrary name in that domain. Like artemis.phishinsite.org, nobody in the world will know that this name exists, the DNS service has never seen a query asking for the IP of that name. Now I send you any link including that domain. You click the link and your OS will query that name through it's network stack. If your network stack is not configured to handle DNS anonymously, this query will leak your real IP, or that of your DNS resolver, which might be your ISP.

Going further, don't deliver an A record on that name. Only deliver a AAAA to force the client down an IPv6 path, revealing a potentially local address.

Just some thoughts. Not sure any of this was applicable to the case.

There are many ways to set up something that could lead to information leakage and people are rarely prepared for it.

[–] [email protected] 10 points 2 months ago (5 children)

Does Tor have no protection against such a simple attack? I always thought any clearnet address i type in the browser (along with the dns query) hops 3 times.

load more comments (5 replies)
[–] [email protected] 29 points 2 months ago (2 children)

Mullvad is pretty good in this regard by forcing you to use their DNS. Though of course, you have to trust them.

[–] [email protected] 16 points 2 months ago (1 children)

Or use Tails which routes all network traffic through TOR

load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 5 points 2 months ago (1 children)

Isn't that calculator photo app backdoored?

[–] [email protected] 5 points 2 months ago

It could, but even without it's very dumb to do such thing and think that you are safe

[–] [email protected] 33 points 2 months ago (3 children)

Compromised ? Maybe, but this guy doesn't provide any evidence one way or the other. He's using at least 7 other possible vectors (apparently Calculator Photo Vault just hides the gallery, no encryption, so it's over right there) which is way too many for good opsec.

With Tor the question has always been compromised exit nodes as I understand it.

[–] [email protected] 4 points 2 months ago (2 children)

Doesnt the prevalence of https solve this issue?

load more comments (2 replies)
[–] [email protected] 7 points 2 months ago

The bro was really dumb to hide things behind an app like this...

[–] [email protected] 12 points 2 months ago* (last edited 2 months ago) (1 children)

In that article they provide a list of steps to follow to be safer on Tor. Is that a good list or is there anything else one can do to maintain their privacy?

[–] [email protected] 5 points 2 months ago

No idea, I was just using it to illustrate the existence of compromised exit nodes, which to my mind are a pretty fatal flaw in TOR, perhaps someone knowledgeable can chime in.

[–] [email protected] 4 points 2 months ago (1 children)

I haven't been following the DNM seen much. Are there any good sources on the recent busts?

load more comments (1 replies)
[–] [email protected] 78 points 2 months ago (1 children)

He most likely had bad OPSEC.

Secondly, he took this imagery he had created and then "turned to AI chatbots to ensure these minor victims would be depicted as if they had engaged in the type of sexual contact he wanted to see." In other words, he created fake AI CSAM—but using imagery of real kids.

This probably didn’t help much either.

[–] [email protected] 26 points 2 months ago (2 children)

The government is cagey about how, exactly, this criminal activity was unearthed, noting only that Herrera "tried to access a link containing apparent CSAM." Presumably, this "apparent" CSAM was a government honeypot file or web-based redirect that logged the IP address and any other relevant information of anyone who clicked on it.

It looks like a combination of bad opsec and clicking on a download link.

I know there has been some back and forth whether it's good to use a VPN with tor and feel like this is just going to open up that conversation again.

[–] [email protected] 8 points 2 months ago (3 children)

I’ve been looking into this myself recently and it’s definitely an interesting conversation.

[–] [email protected] 6 points 2 months ago (3 children)

It might depend on the VPN provider. If it's someone like Google, no way.

But Mullivad that has a proven track record of not keeping logs, that might be worth it.

I've also heard tor over i2p but don't know enough about the latter to have an opinion

load more comments (3 replies)
load more comments (2 replies)
load more comments (1 replies)
load more comments
view more: ‹ prev next ›