pull down to refresh

good reason to switch tor connections relays every few minutes to reduce risk of them being able to do this. Or have a proxy computer in a seperate location as you that you connect to as well
reply
TLDR: article gives no answer. There is an active, anti-terrorism case going on and the defendant asked for evidence about how the IP & traffic was confirmed to be host and the FBI doesn't want to release it's methods to the courts/public
reply
This should kill the FBI's case, since illegally-obtained evidence is automatically inadmissable in court (cf. fruit of the poisonous tree). If the only way to obtain evidence is through illegal means (e.g. unconstitutional wiretapping), then the evidence is inadmissible. But as we saw in the Ross Ulbright case, judges can arbitrarily overrule that protection against illegally-obtained evidence.
reply
A "CALEA" warrant approved by a judge makes it legal for US citizens. Federal intelligence have abused the secret FISA process established by the Patriot Act after 9/11. Foreign subjects do not require a warrant under FISA.
reply
This should kill the FBI's case, since illegally-obtained evidence is automatically inadmissable in court
in a banana republic the fed can overrule everything
reply
Add even with the weakest cases the Feds get a 99% convection rate. It is ridiculous.
reply
Well if the guy is lucky they will drop charges instead of having to disclose
The only thing that springs to mind is a Sybil attack, which is a major vulnerability of Tor. Basically, if your message is encrypted by 3 separate computers (relays), then feds could simply pose as independent relays themselves. By relaying your message between each other, they could effectively deanonymize you.
reply
This is a very expensive attack, it would require 3000 routers to be set up to get a 1/3 chance of catching timing data. Some believe this is how they got Silk road. The tiny number of nodes compared to users makes it a lot cheaper than it could be if there was any incentive to run relays.
reply
A sybil attack to catch a terrorist would still be one hell of a case budget. I think he just used an app that leaked data. Every other day I'm sure the Tor browser is patching more and more of these. Browser technology is a dense thicket of privacy leaks.
There's been too many such cases altogether (this is the second I hear) to not be of the opinion that privacy technology needs a reboot. Roger has failed us.
reply