On Sat, 2013-10-05 at 13:47 -0500, Ian Clarke wrote:
> This doesn't have anything to do with the Silk Road takedown, if that is
> what you are referring to.
> 
> The vulnerability there was "between keyboard and chair".

... not only, in this case also in software ...

2013 IEEE Symposium on Security and Privacy
Trawling for Tor Hidden Services: 
Detection, Measurement, Deanonymization
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
<http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf>

> On Sat, Oct 5, 2013 at 1:26 PM, Robert Hailey 
> <[email protected]>wrote:
> 
> >
> > Is MITM the right term?
> >
> > Not to be picky... but I thought they just pulled the server that was
> > serving up those particular hidden services and dropped in a new server
> > with the "identify all users" exploit [if they were not controlling that
> > server in the first place :-) ].
> >

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
Devl mailing list
[email protected]
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to