dslreports logo
 
    All Forums Hot Topics Gallery
spc
view:
topics flat nest 
Comments on news posted 2013-09-06 08:38:07: As recently noted, the anonymizing Tor network saw an unprecedented spike in traffic in August, the 100% surge during the month to 1,200,000 users being the highest usage on record for the project. ..


guppy_fish
Premium Member
join:2003-12-09
Palm Harbor, FL

guppy_fish

Premium Member

More likely a DOS against TOR

This sounds more like a NSA driven DOS ( Denial Of Service ), even the details just say it can't be people behind the uptick so they think that only leaves BotNets, since no software vendors have come forward to bundling TOR.

Well whom doesn't want public functioning anonymous network? , it isn't the BOTS ... Its are own NSA

FFH5
Premium Member
join:2002-03-03
Tavistock NJ

FFH5

Premium Member

Could botnet deployers be a national security agency?

There are lots of security agencies in countries around the world that don't like the Tor network at all. It is possible the botnet used against Tor was designed by one of those country's agencies.
FFH5

FFH5 to guppy_fish

Premium Member

to guppy_fish

Re: More likely a DOS against TOR

said by guppy_fish:

This sounds more like a NSA driven DOS ( Denial Of Service ), even the details just say it can't be people behind the uptick so they think that only leaves BotNets, since no software vendors have come forward to bundling TOR.

Well whom doesn't want public functioning anonymous network? , it isn't the BOTS ... Its are own NSA

Or security agencies in China, Iran, Pakistan, N. Korea, or a dozen other countries.

guppy_fish
Premium Member
join:2003-12-09
Palm Harbor, FL

guppy_fish

Premium Member

Yes good points, and I agree with your list of suspects!

ARGONAUT
Have a nice day.
Premium Member
join:2006-01-24
New Albany, IN

ARGONAUT

Premium Member

We have to spy on you to protect you.

Majority of Tor crypto keys could be broken by NSA

The majority of devices connected to the Tor privacy service may be using encryption keys that can be broken by the National Security Agency, a security researcher has speculated.

Rob Graham, CEO of penetration testing firm Errata Security, arrived at that conclusion by running his own "hostile" exit node on Tor and surveying the encryption algorithms established by incoming connections. About 76 percent of the 22,920 connections he polled used some form of 1024-bit Diffie-Hellman key. The analysis came a day after revelations the NSA can circumvent much of the encryption used on the Internet. While no one knows for sure exactly what the NSA is capable of cracking, educated speculation has long made a case that the keys Graham observed are within reach of the US spy agency.

»arstechnica.com/security ··· er-says/