Reefa Posted April 26, 2015 Share Posted April 26, 2015 A recent security breach just provided a painful reminder that Tor's anonymity network isn't completely foolproof against truly determined intruders. The email service SIGAINT is warning users that someone recently launched a sustained attempt to break into its servers and snoop on messages. While that direct attack wasn't successful, the culprit also tried setting up malicious exit nodes (where data reaches the normal internet) in hopes of spying on messages the moment they left Tor. The chances of actually connecting to one of these rogue routers was slim (about 2.7 percent), but you clearly wouldn't have enjoyed winning this lottery.The kicker? The campaign was probably avoidable. SIGAINT doesn't encrypt its normal website, which let the perpetrator get away with the impersonation necessary for this campaign. The service tells Motherboard that it doesn't lock this site because it's both a hassle for users and ineffective against fake security certificates, but that's not much consolation if you're affected. SIGAINT hasn't said exactly what it will do, but it's looking at either encrypting its page or pulling the public Tor link to reduce the chances of this kind of assault.It's not clear who's responsible, and there's no clear evidence that this was a government agency trying to spy on drug dealers and terrorists. Given the low odds of intercepting any useful messages, the attack could just as easily be the work of criminals hoping to get lucky, or even someone holding a grudge. Whoever's at fault, the incident suggests that you'll want to be careful about sending sensitive messages, no matter how secure you think a service might be.engadget.com Link to comment Share on other sites More sharing options...
ugurano Posted April 26, 2015 Share Posted April 26, 2015 tor have exit code, and this programm no anonym Link to comment Share on other sites More sharing options...
212eta Posted April 27, 2015 Share Posted April 27, 2015 https://www. torproject.org/about/sponsors.html.en Link to comment Share on other sites More sharing options...
IDAProFTW Posted April 27, 2015 Share Posted April 27, 2015 Even if you use Tor based e-mail, you should still NEVER send plaintext e-mails.ALWAYS encrypt your messages with GPGAnything encrypted with GPG will not be viewable by anyone other than you and the person you sent the message to. Even if someone gets access to your account and logs in. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.