On Sat, 2013-10-05 at 13:47 -0500, Ian Clarke wrote: > This doesn't have anything to do with the Silk Road takedown, if that is > what you are referring to. > > The vulnerability there was "between keyboard and chair".
... not only, in this case also in software ... 2013 IEEE Symposium on Security and Privacy Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann <http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf> > On Sat, Oct 5, 2013 at 1:26 PM, Robert Hailey > <[email protected]>wrote: > > > > > Is MITM the right term? > > > > Not to be picky... but I thought they just pulled the server that was > > serving up those particular hidden services and dropped in a new server > > with the "identify all users" exploit [if they were not controlling that > > server in the first place :-) ]. > >
signature.asc
Description: This is a digitally signed message part
_______________________________________________ Devl mailing list [email protected] https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
