Warning: filesize(): stat failed for /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/uploads/wpo/images/wpo_logo_small.png.webp.lossy.webp in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php on line 70

Warning: rename(/data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/uploads/wpo/images/wpo_logo_small.png.webp.lossy.webp,/data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/uploads/wpo/images/wpo_logo_small.png.webp): No such file or directory in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php on line 73

Warning: Cannot modify header information - headers already sent by (output started at /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php:70) in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php:70) in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php:70) in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php:70) in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php:70) in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php:70) in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php:70) in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-content/plugins/wp-optimize/vendor/rosell-dk/webp-convert/src/Convert/Converters/ConverterTraits/EncodingAutoTrait.php:70) in /data/web/virtuals/83519/virtual/www/subdom/pohled/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":683,"date":"2014-11-08T12:00:40","date_gmt":"2014-11-08T11:00:40","guid":{"rendered":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/?p=683"},"modified":"2014-11-17T11:41:38","modified_gmt":"2014-11-17T10:41:38","slug":"zname-detaily-o-vedeni-utoku-na-sit-tor-v-ramci-operation-onymous-tezky-uder-na-darknetu-potvrzen-technicka-analyza-operace-od-clena-hnuti-anonymous-exkluzivne-na-ae-news","status":"publish","type":"post","link":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/zname-detaily-o-vedeni-utoku-na-sit-tor-v-ramci-operation-onymous-tezky-uder-na-darknetu-potvrzen-technicka-analyza-operace-od-clena-hnuti-anonymous-exkluzivne-na-ae-news\/","title":{"rendered":"Zn\u00e1me detaily o veden\u00ed \u00fatoku na s\u00ed\u0165 TOR v r\u00e1mci \u201eOperation Onymous\u201c, t\u011b\u017ek\u00fd \u00fader na Darknetu potvrzen. Technick\u00e1 anal\u00fdza operace od \u010dlena hnut\u00ed Anonymous, exkluzivn\u011b na AE News!"},"content":{"rendered":"

Redakce AE News p\u0159in\u00e1\u0161\u00ed na\u0161im \u010dten\u00e1\u0159\u016fm exkluzivn\u00ed v\u00fdpov\u011b\u010f od \u010dlena hnut\u00ed Anonymous, kter\u00fd kontaktoval na\u0161\u00ed redakci se \u017e\u00e1dost\u00ed o uve\u0159ejn\u011bn\u00ed z\u00e1va\u017en\u00fdch informac\u00ed ohledn\u011b \u00fatoku FBI a Europolu na anonymiza\u010dn\u00ed s\u00ed\u0165 TOR a jej\u00ed Onion Network, tedy s\u00ed\u0165 skryt\u00fdch dom\u00e9n pou\u017e\u00edvaj\u00edc\u00edch ileg\u00e1ln\u00ed koncovku .onion na internetu. Na\u0161e redakce nem\u011bla mo\u017enost ov\u011b\u0159it pravdivost informac\u00ed v dokumentu uveden\u00fdch, ov\u0161em z\u00e1va\u017enost \u00fadaj\u016f a detail\u016f v dokumentu nazna\u010duje, \u017ee informace jsou legitimn\u00ed a je pot\u0159eba je br\u00e1t opravdu v\u00e1\u017en\u011b. Redakce AE News nem\u00e1 \u017e\u00e1dnou spojitost s touto osobou nebo jej\u00ed \u010dinnost\u00ed, poskytujeme zde pouze nez\u00e1visl\u00fd a svobodn\u00fd informa\u010dn\u00ed prostor. P\u0159eklad textu z ru\u0161tiny za\u0159\u00eddil VK.<\/p>\n

\"\"<\/p>\n

[GRAFIKA] Edward Snowden odhalil, \u017ee NSA se zaj\u00edm\u00e1 o zranitelnost TORu ji\u017e velmi dlouho<\/em><\/p>\n

Dobr\u00fd den. Na na\u0161em rusk\u00e9m serveru Inosmi.ru jsem objevil v\u00e1\u0161 profil a proto\u017ee m\u00e1m mnoho p\u0159\u00e1tel v \u010cesku, r\u00e1d bych vyu\u017eil Va\u0161\u00ed nez\u00e1vislou platformu AE News k uve\u0159ejn\u011bn\u00ed z\u00e1sadn\u00edch informac\u00ed a skute\u010dnost\u00ed o operaci \u201eOnymous\u201c, kterou provedla americk\u00e1 FBI ve spolupr\u00e1ci s evropsk\u00fdmi org\u00e1ny Europolu a Eurojustu. Jsem \u010dlenem rusk\u00e9 divize Anonymous a toto jsou n\u011bkter\u00e9 na\u0161e darknetov\u00e9 str\u00e1nky, kontakty na mne zde, pokud mne budete cht\u00edt kontaktovat (pozn. redakce: z bezpe\u010dnostn\u00edch d\u016fvod\u016f nic o autorovi zpr\u00e1vy neuve\u0159ej\u0148ujeme<\/em>). M\u00e9dia neuv\u00e1d\u00ed pravdu, co st\u00e1lo za touto operac\u00ed a jak\u00fdm zp\u016fsobem do\u0161lo k zabaven\u00ed v\u00edce ne\u017e 400 darknetov\u00fdch dom\u00e9n (pozn. redakce: Darknet je p\u0159ezd\u00edvka pro s\u00ed\u0165 Onion Network vyu\u017e\u00edvaj\u00edc\u00ed servery a dom\u00e9ny ukryt\u00e9 v TOR s\u00edti za dom\u00e9nami .onion<\/em>). Obrac\u00edm se na v\u00e1s se \u017e\u00e1dost\u00ed, abyste uve\u0159ejnili technickou specifikaci \u00fatoku, kter\u00e1 v d\u016fsledku znamen\u00e1, \u017ee s\u00ed\u0165 TOR definitivn\u011b ztratila svoji bezpe\u010dnost. Informace, kter\u00e9 uv\u00e1d\u00edm, jsou potvrzen\u00edm toho, \u017ee s\u00ed\u0165 TOR m\u00e1 chybu v designu, se kterou auto\u0159i projektu nepo\u010d\u00edtali, p\u0159esto\u017ee dlouh\u00e1 l\u00e9ta byli na tuto chybu upozor\u0148ov\u00e1ni.<\/p>\n

Tor ji\u017e nen\u00ed bezpe\u010dn\u00fd!<\/h3>\n

Jak jste zaznamenali asi i vy z m\u00e9di\u00ed v \u010cesku (ano, zaznamenali jsme, nap\u0159. zde<\/a><\/em>), americk\u00e1 FBI ve spolupr\u00e1ci s evropsk\u00fdmi org\u00e1ny represivn\u00edch slo\u017eek provedla z\u00e1tah na sajtu Silk Road 2.0 a dal\u0161\u00edch v\u00edce ne\u017e 400 dom\u00e9n s nejr\u016fzn\u011bj\u0161\u00edm obsahem nab\u00edzen\u00fdch slu\u017eeb. Na serveru Arstechnica vy\u0161el dezinforma\u010dn\u00ed \u010dl\u00e1nek FBI [1<\/a>], kter\u00fd m\u00e1 z\u00e1m\u011brn\u011b odv\u00e9st pozornost od hlavn\u00edho zp\u016fsobu odhalen\u00ed server\u016f a identit osob. V \u010dl\u00e1nku je uvedeno, \u017ee pro zadr\u017een\u00ed oper\u00e1tora Silk Road 2.0 byla pou\u017eita infiltrace agentem. To je z\u0159ejm\u011b pravda. Ale nen\u00ed to pravda pro zbytek zaji\u0161t\u011bn\u00fdch web\u016f, takov\u00fd objem dom\u00e9n a server\u016f nebyl odhalen formou infiltrace, to je le\u017e, ale d\u00edky spolupr\u00e1ci FBI a Europolu s ISP oper\u00e1tory. M\u00e1me v na\u0161\u00ed skupin\u011b dostate\u010dn\u011b ov\u011b\u0159enou informaci, jak k \u00fatoku do\u0161lo ve skute\u010dnosti.<\/p>\n

Nyn\u00ed v\u00edme, \u017ee FBI a Europol uplatnili soudn\u00ed p\u0159\u00edkazy o ml\u010denlivosti (tzv. \u201egag orders\u201c) t\u00e9m\u011b\u0159 dv\u011bma des\u00edtk\u00e1m nejv\u011bt\u0161\u00edch ISP oper\u00e1tor\u016f v Evrop\u011b a v USA. K \u00fatoku byla pou\u017eita metoda TC-attack, tzn. Traffic Confirmation \u00fatok. C\u00edlem \u00fatoku bylo z\u00edsk\u00e1n\u00ed identity klient\u016f a jejich serverov\u00fdch prot\u011bj\u0161k\u016f bez nutnosti nabour\u00e1vat kryptov\u00e1n\u00ed nebo vnit\u0159n\u00ed komunikaci TOR networku. O to se pokou\u0161eli mnohokr\u00e1t a ne\u00fasp\u011b\u0161n\u011b. Pokus\u00edm se v\u00e1m popsat, jak \u00fatok prob\u00edhal a m\u016f\u017ee b\u00fdt kdykoliv v budoucnu zopakov\u00e1n, v \u010dem\u017e spo\u010d\u00edv\u00e1 nejv\u011bt\u0161\u00ed hrozba pro svobodn\u00fd internet, pro bitcoinov\u00e9 obchody, utajenou komunikaci a transakce, k nim\u017e nemaj\u00ed z principu m\u00edt p\u0159\u00edstup represivn\u00ed org\u00e1ny a dozorov\u00e9 slo\u017eky.<\/p>\n

\"\"<\/p>\n

[GRAFIKA] Onion Network, p\u0159ezd\u00edvan\u00fd Darknet, p\u0159edstavuj\u00ed servery, kter\u00e9 jsou dostupn\u00e9 jen zevnit\u0159 s\u00edt\u011b TOR<\/em><\/p>\n

S\u00ed\u0165 TOR je uvnit\u0159 bezpe\u010dn\u00e1. Zraniteln\u00e1 je ale na sv\u00e9m vstupu (Entry Nodes) a v\u00fdstupech (Exit Nodes). Pro zji\u0161t\u011bn\u00ed identity klienta \u201eA\u201c, kter\u00fd komunikuje se str\u00e1nkou nebo serverem \u201eB\u201c, je zapot\u0159eb\u00ed monitorovat proud\u00edc\u00ed data. To se p\u0159ed mnoha lety zd\u00e1lo jako velmi t\u011b\u017ek\u00e9 a tud\u00ed\u017e auto\u0159i TOR s\u00edt\u011b tomu nev\u011bnovali pozornost, resp. v\u011bd\u011bli o probl\u00e9mu, ale neo\u010dek\u00e1vali v\u00fdvoj v\u011bc\u00ed budouc\u00edch, nepo\u010d\u00edtali s kauzou Snowden a se skute\u010dn\u00fdmi mo\u017enostmi, kapacitami a neomezenou moc\u00ed tajn\u00fdch slu\u017eeb. Cel\u00e1 v\u011bc je p\u0159itom hroziv\u011b jednoduch\u00e1 a vektor \u00fatoku je snadn\u00fd a lze jej opakovat neust\u00e1le dokola, kdykoliv. Funguje to n\u00e1sledovn\u011b.<\/p>\n

Va\u0161e identita na TORu je nyn\u00ed dostupn\u00e1 doslova na po\u017e\u00e1d\u00e1n\u00ed<\/h3>\n

Pro zji\u0161t\u011bn\u00ed identity u\u017eivatele \u201eA\u201c p\u0159istupuj\u00edc\u00edho skrze TOR s\u00ed\u0165 na server \u201eB\u201c sta\u010d\u00ed z\u00edskat spolupr\u00e1ci obou ISP oper\u00e1tor\u016f, tedy jak ISP, kter\u00fd poskytuje konektivitu klientovi \u201eA\u201c, tak i ISP, u kter\u00e9ho je hostovan\u00fd Exit node. Kdy\u017e se pod\u00edv\u00e1te na tabulku n\u00ed\u017ee, vid\u00edte, \u017ee majorita tzv. Exit Nodes je hostov\u00e1na ve skute\u010dnosti jen u hrstky spole\u010dnost\u00ed, francouzsk\u00fd OVH Systems je v Evrop\u011b na \u0161pici. Ve spolupr\u00e1ci s vl\u00e1dami jednotliv\u00fdch zem\u00ed tak do\u0161lo k vyd\u00e1n\u00ed p\u0159\u00edkaz\u016f oper\u00e1tor\u016fm, aby nasadili na sv\u00e9 gatewaye analytick\u00e9 sniffery.<\/p>\n

\"\"<\/p>\n

[GRAFIKA] Um\u00edst\u011bn\u00ed po\u010dtu Exit Nodes s\u00edt\u011b TOR u jednotliv\u00fdch ISP oper\u00e1tor\u016f, nejv\u00edce u OVH<\/em><\/p>\n

Stejn\u00e9 sniffery potom byly p\u0159\u00edkazem nasazeny u americk\u00fdch ISP oper\u00e1tor\u016f jako Verizon, Road Runner, Comcast a dal\u0161\u00edch. \u00datok spo\u010d\u00edv\u00e1 n\u00e1sledn\u011b v TC-attacku, kdy analytick\u00e9 softwary na vstupu A a v\u00fdstupu B porovn\u00e1vaj\u00ed sekvence paket\u016f. Nen\u00ed to nijak n\u00e1ro\u010dn\u00e9, proto\u017ee \u00fatok je veden pouze na pakety TORu, ostatn\u00ed pakety tyto sniffery propou\u0161t\u00ed. Pro zaji\u0161t\u011bn\u00ed identity sta\u010d\u00ed jedin\u00fd paket, kter\u00fd projde br\u00e1nou oper\u00e1tora A v jeho s\u00edti nap\u0159. ve Francii a tent\u00fd\u017e paket v bod\u011b B, kter\u00fd p\u0159ijde do Exit Nodu hostovan\u00e9ho v USA. Pokud pakety souhlas\u00ed, dojde k potvrzen\u00ed identity paketu a jeho p\u016fvodu a tak\u00e9 c\u00edle, kam sm\u011b\u0159uje. Zranitelnost spo\u010d\u00edv\u00e1 i v tom, \u017ee TOR nen\u00ed kryptov\u00e1n end-to-end, tak\u017ee pokud nepou\u017e\u00edv\u00e1te HTTPS pro webovky nebo TLS pro v\u00e1\u0161 SMTP server, \u00fato\u010dn\u00edk m\u016f\u017ee sniffovat v\u00e1\u0161 traffic [2<\/a>] a t\u00edm z\u00edskat cestu k odhalen\u00ed va\u0161\u00ed identity.<\/p>\n

Represivn\u00ed org\u00e1ny tak ihned zjist\u00ed, jak\u00e1 fyzick\u00e1 osoba kter\u00e9ho ISP se p\u0159ipojovala na ten kter\u00fd darknetov\u00fd server hostovan\u00fd u hostingov\u00e9ho oper\u00e1tora za Exit Nodem. K tomu je zapot\u0159eb\u00ed spolupr\u00e1ce policie v\u00edce zem\u00ed, proto byla operace Onymous tak rozs\u00e1hl\u00e1. Jakmile znaj\u00ed identitu klienta A, za\u010dnou mu sledovat trval\u00e9 bydli\u0161t\u011b, jeho po\u0161tu, bal\u00ed\u010dky, nap\u00edchnou mu email. Stejn\u011b tak zjist\u00ed, kter\u00fd server u hostingov\u00e9ho centra hostuje dakrnetov\u00fd web server. Pokud majitel serveru byl neopatrn\u00fd a plat\u00ed za hosting jako fyzick\u00e1 osoba, maj\u00ed ho. Pokud je to osoba, kter\u00e1 plat\u00ed za server anonymn\u011b, maj\u00ed prost\u0159edky, jak identitu zjistit. Pokus\u00ed se ho donutit k telefonick\u00e9mu kontaktu s providerem pod n\u011bjakou z\u00e1minkou slevy, nab\u00eddky, rozhovoru o mo\u017enostech upgradu zdarma v r\u00e1mci promo akce, \u0159e\u0161en\u00ed technick\u00fdch pot\u00ed\u017e\u00ed atd. a zjist\u00ed jeho identitu pomoc\u00ed telefonu. Policie ale ve v\u011bt\u0161in\u011b p\u0159\u00edpad\u016f nainstaluje na server nejprve malware a z cel\u00e9ho darknetov\u00e9ho webu se stane \u201etrap box\u201c, tak\u017ee dok\u00e1\u017eou identifikovat po ur\u010dit\u00e9 dob\u011b stovky a tis\u00edce klient\u016f dan\u00e9ho webu.<\/p>\n

Ml\u010den\u00ed autor\u016f TORu nah\u00e1n\u00ed doslova strach<\/h3>\n

Auto\u0159i TORu p\u0159izn\u00e1vaj\u00ed zranitelnost syst\u00e9mu, je-li vektor \u00fatoku veden jako Confirmation attack, tedy TC-attack [3<\/a>]. Zapomn\u011bli ale na globalizaci. Jde toti\u017e o to, \u017ee m\u00e1te nap\u0159. ve zm\u00edn\u011bn\u00e9 Francii 22 velk\u00fdch ISP oper\u00e1tor\u016f, kte\u0159\u00ed pokr\u00fdvaj\u00ed 96% v\u0161ech Francouz\u016f, ale majetkov\u00e1 prov\u00e1zanost t\u011bch spole\u010dnost\u00ed s investory je takov\u00e1, \u017ee t\u011bch 22 oper\u00e1toru na n\u011bjak\u00e9 \u00farovni naho\u0159e m\u00e1 jen 4 majitele, v\u011bt\u0161inou investi\u010dn\u00ed skupiny nebo banky. Ameri\u010dan\u00e9 (za spolupr\u00e1ce vl\u00e1dy dan\u00e9 zem\u011b) proto p\u0159edaj\u00ed p\u0159\u00edkaz t\u011bmto 4 investi\u010dn\u00edm dom\u016fm, aby daly p\u0159\u00edkazy \u0159editel\u016fm ISP, aby umo\u017enili FBI a dal\u0161\u00edm monitorovat TOR traffic od u\u017eivatel\u016f. Pokud by to majitel\u00e9 ISP odm\u00edtli (co\u017e se nikdy nestane), \u010dekali by je obrovsk\u00e9 sankce na americk\u00e9m finan\u010dn\u00edm trhu, zablokov\u00e1ni dolarov\u00fdch operac\u00ed, obvin\u011bni z napom\u00e1h\u00e1n\u00ed terorismu a pran\u00ed \u0161pinav\u00fdch pen\u011bz atd. K tomu ale nikdy nedojde, \u017e\u00e1dn\u00e1 finan\u010dn\u00ed skupina nikdy nep\u016fjde proti p\u0159\u00edkaz\u016fm FBI, Europolu, pokud p\u0159ijde \u0159e\u010d na to, \u017ee sniffery maj\u00ed za \u00fakol vysledovat distributory drog apod. V d\u016fsledku tedy maj\u00ed org\u00e1ny mo\u017enost prov\u00e1d\u011bt TC-attacky v masivn\u00edm neomezen\u00e9m m\u011b\u0159\u00edtku.<\/p>\n

FBI a Europol pochopiteln\u011b nemohou pokr\u00fdt 100% v\u0161ech ISP oper\u00e1tor\u016f na sv\u011bt\u011b (zat\u00edm), ale jeliko\u017e s\u00ed\u0165 TOR funguje zp\u016fsobem, \u017ee m\u011bn\u00ed identitu po ka\u017ed\u00e9m p\u0159ipojen\u00ed, sta\u010d\u00ed si jen po\u010dkat, a\u017e se ob\u011b\u0165 p\u0159ipoj\u00ed na Entry nod hostovan\u00fd u n\u011bkter\u00e9ho ze spolupracuj\u00edc\u00edch ISP. Jak jednoduch\u00e9, jak \u00fa\u010dinn\u00e9. TC-attack tak p\u0159edstavuje hrozbu, proti kter\u00e9 v t\u00e9to chv\u00edli nem\u00e1 TOR obranu. Existuje v\u0161ak zp\u016fsob ochrany na stran\u011b klienta.<\/p>\n

TC-attack lze do zna\u010dn\u00e9 m\u00edry eliminovat, pokud se nejprve p\u0159ipoj\u00edte se sv\u00fdm po\u010d\u00edta\u010dem do kryptovan\u00e9 VPN s\u00edt\u011b, kter\u00e1 zaru\u010den\u011b nic a nikoho neloguje. Teprve pot\u00e9 se p\u0159ipoj\u00edte do s\u00edt\u011b TOR pomoc\u00ed Tor Browseru. Syst\u00e9m komunikace potom prob\u00edh\u00e1 n\u00e1sledovn\u011b: V\u00e1\u0161 vlastn\u00ed ISP oper\u00e1tor nevid\u00ed \u017e\u00e1dnou TOR komunikaci, pouze VPN kryptovanou konektivitu. To je v po\u0159\u00e1dku. Do s\u00edt\u011b TOR tak va\u0161e pakety vstupuji a\u017e z VPN serveru. Sniffer ISP\/Hosting oper\u00e1tora, kter\u00fd zrovna hostuje Entry Nod, tak na vstupu uvid\u00ed komunikaci z VPN hostingu. TC-attack sice zjist\u00ed identitu paket\u016f, ale klient A je identifikov\u00e1n pouze jako komunikace p\u0159ich\u00e1zej\u00edc\u00ed z VPN networku. A pokud VPN provider neloguje komunikaci, je to fajn, jste v bezpe\u010d\u00ed. Je to ale bezpe\u010d\u00ed relativn\u00ed, proto\u017ee kdy\u017e dojde na l\u00e1m\u00e1n\u00ed chleba, kter\u00fd VPN provider bude br\u00e1nit va\u0161\u00ed identitu, kdy\u017e za n\u00edm p\u0159ijdou z FBI a \u0159eknou mu, \u017ee prod\u00e1v\u00e1te drogy a \u017ee kdy\u017e v\u00e1s neumo\u017en\u00ed logovat, \u017ee bude obvin\u011bn z napom\u00e1h\u00e1n\u00ed a konspirace? Tak\u017ee v kone\u010dn\u00e9m d\u016fsledku ani VPN v\u00e1s neochr\u00e1n\u00ed.<\/p>\n

N\u00e1hrada za TOR neexistuje, oprava TORu v nedohlednu!<\/h3>\n

100% \u0159e\u0161en\u00ed a obrana proti TC-attack na s\u00ed\u0165 TOR zat\u00edm neexistuje. V\u00fdvoj\u00e1\u0159i TORu ml\u010d\u00ed a nam\u00edsto sebereflexe vyd\u00e1vaj\u00ed trapn\u00e1 prohl\u00e1\u0161en\u00ed o tom, \u017ee se nic vlastn\u011b nestalo. Tohle je natolik zoufal\u00e1 situace, \u017ee jsem se rozhodl uve\u0159ejnit tyto informace, abych varoval ostatn\u00ed lidi, proto\u017ee bu\u010f jsou v\u00fdvoj\u00e1\u0159i TORu nezodpov\u011bdn\u00ed, anebo n\u011bjak dokonce spolupracuj\u00ed s FBI, kdy\u017e nehodlaj\u00ed chybu v designu TORu p\u0159iznat a opravit. TOR is flawed by design! To by m\u011blo te\u010f b\u00fdt napsan\u00e9 na jejich webov\u00e9 str\u00e1nce. Dokud nebude vy\u0159e\u0161ena zranitelnost TORu skrze vektor TC-attack, do t\u00e9 doby nen\u00ed TOR ani Tor Browser bezpe\u010dn\u00fd pro nikoho! Dokud dok\u00e1\u017e\u00ed identifikovat identitu paketu na vstupu a na v\u00fdstupu, do t\u00e9 doby nebude TOR p\u0159edstavovat bezpe\u010dnou anonymiza\u010dn\u00ed platformu, ale sp\u00ed\u0161 obrovsk\u00fd honey pot na d\u016fv\u011b\u0159iv\u00e9 lidi, kte\u0159\u00ed si mysl\u00ed, \u017ee komunikuj\u00ed anonymn\u011b.<\/p>\n

Vektor \u00fatoku na Entry nodu je v\u011bt\u0161\u00ed probl\u00e9m, ne\u017e vulnerabilita na Exit nodech. Sniffery jsou nasazen\u00e9 nejen u evropsk\u00fdch hlavn\u00edch ISP oper\u00e1tor\u016f, a<\/var>le i u velk\u00fdch hostingov\u00fdch firem, tak\u017ee oni dok\u00e1\u017eou confirmovat identitu na stran\u011b A bu\u010f u va\u0161eho ISP nebo na prvn\u00edm vstupn\u00edm Entry nodu TOR s\u00edt\u011b. Stejn\u011b tak sniffuj\u00ed hostingy s Exit nody a hostingy, kde b\u011b\u017e\u00ed darknetov\u00e9 servery.<\/p>\n

\"\"<\/p>\n

[GRAFIKA] Tento obr\u00e1zek nahradil mnoho darknetov\u00fdch str\u00e1nek v posledn\u00edch hodin\u00e1ch<\/em><\/p>\n

\u017de se jedn\u00e1 o TC-attack m\u00e1me potvrzeno d\u00edky tomu, \u017ee jeden z na\u0161ich darknetov\u00fdch server\u016f spolupracuje pouze s klienty na\u0161\u00ed VPN priv\u00e1tn\u00ed s\u00edt\u011b, a ten nebyl prolomen, nebyl zkonfiskov\u00e1n, funguje d\u00e1l. Zat\u00edmco od koleg\u016f z D\u00e1nska m\u00e1me informace, \u017ee jejich hostingy byly identifikov\u00e1ny komplet v\u0161echny, v\u010detn\u011b u\u017eivatel\u016f (nemaj\u00ed VPN). Stejn\u011b tak dal\u0161\u00ed skupiny s VPN kryt\u00edm hl\u00e1s\u00ed norm\u00e1ln\u00ed stav, zat\u00edmco ty bez VPN kryt\u00ed bu\u010f skon\u010dily nebo hl\u00e1s\u00ed infiltraci a odhalen\u00ed. Nejv\u00edce ob\u011bt\u00ed hl\u00e1s\u00ed OVH Systems klienti, tento oper\u00e1tor z\u0159ejm\u011b spolupracuje s FBI nejintenzivn\u011bji.<\/p>\n

\u00c9ra po TORu? Co d\u011blat v t\u00e9to situaci?<\/h3>\n

Jak se kr\u00fdt? TOR network lze zat\u00edm bezpe\u010dn\u011b pou\u017e\u00edt z ve\u0159ejn\u00fdch WIFI hotspot\u016f a za pou\u017eit\u00ed VPN priv\u00e1tn\u00edho serveru, kter\u00fd si sami provozujete n\u011bkde jako Black Box a plat\u00edte hosting, na kter\u00e9m v\u00e1m box jede a plat\u00edte za hosting p\u0159es Bitcoin. Komer\u010dn\u00ed VPN jako HideMyAss nebo iPredator jsou nebezpe\u010dn\u00e9, i kdy\u017e neloguj\u00ed t\u0159eba te\u010f, pokud je kontaktuj\u00ed z FBI, dovol\u00ed jim logovat v\u00e1s potom, o tom nepochybujte. Takov\u00e9 ty kecy o tom, \u017ee za \u017e\u00e1dn\u00fdch okolnost\u00ed nikdy nic nikomu neposkytnou a nebudou logovat, to jsou jenom marketingov\u00e9 pov\u00edda\u010dky. Kdy\u017e k nim p\u0159ijde tajn\u00e1 slu\u017eba, daj\u00ed jim pokorn\u011b i kl\u00ed\u010de od sv\u00e9ho Cadillacu. Pod\u00edvejte se, jak dopadli bojovn\u00edci z The Pirate Bay. V\u0161ichni jsou dnes zat\u010deni. Oni v\u011b\u0159ili, \u017ee m\u016f\u017eou bojovat proti syst\u00e9mu zbran\u011bmi tohoto syst\u00e9mu, p\u0159ed soudama. Naivkov\u00e9. Soudy ani ve \u0160v\u00e9dsku nejsou n\u00e1strojem spravedlnosti, ale n\u00e1strojem prosazov\u00e1n\u00ed st\u00e1tn\u00edho pr\u00e1va a z\u00e1jm\u016f st\u00e1tu, ne ob\u010dan\u016f. Syst\u00e9m nelze porazit jeho vlastn\u00edmi zbran\u011bmi (soudy, z\u00e1kony, \u00fa\u0159ady).<\/p>\n","protected":false},"excerpt":{"rendered":"

Redakce AE News p\u0159in\u00e1\u0161\u00ed na\u0161im \u010dten\u00e1\u0159\u016fm exkluzivn\u00ed v\u00fdpov\u011b\u010f od \u010dlena hnut\u00ed Anonymous, kter\u00fd kontaktoval na\u0161\u00ed redakci se \u017e\u00e1dost\u00ed o uve\u0159ejn\u011bn\u00ed z\u00e1va\u017en\u00fdch informac\u00ed ohledn\u011b \u00fatoku FBI a Europolu na anonymiza\u010dn\u00ed s\u00ed\u0165 TOR a jej\u00ed Onion Network, tedy s\u00ed\u0165 skryt\u00fdch dom\u00e9n pou\u017e\u00edvaj\u00edc\u00edch ileg\u00e1ln\u00ed koncovku .onion na internetu. Na\u0161e redakce nem\u011bla mo\u017enost ov\u011b\u0159it…<\/p>\n","protected":false},"author":3,"featured_media":315,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_expiration-date-status":"saved","_expiration-date":0,"_expiration-date-type":"","_expiration-date-categories":[],"_expiration-date-options":[]},"categories":[5,6],"tags":[441,442,290,291,174,440,439],"class_list":["post-683","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-svet","category-usa","tag-darknet","tag-fbi","tag-internet","tag-nsa","tag-snowden","tag-tor","tag-vpn"],"_links":{"self":[{"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/posts\/683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/comments?post=683"}],"version-history":[{"count":1,"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/posts\/683\/revisions"}],"predecessor-version":[{"id":684,"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/posts\/683\/revisions\/684"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/media\/315"}],"wp:attachment":[{"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/media?parent=683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/categories?post=683"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/pohled.podhrazsky.eu\/subdom\/pohled\/wp-json\/wp\/v2\/tags?post=683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}