TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A dark web tycoon pleads guilty, but how was he caught?

168 pointsby havellaover 5 years ago

13 comments

marta_morenaover 5 years ago
This sounds fishy. He probably pleaded guilty as part of a plea deal, so law enforcement has a scapegoat and some meaningless &quot;media success&quot; in exchange for him getting a drastically reduced sentencing. They always do that, threaten people with insane penalties if they don&#x27;t accept so shitty plea deal and if you are not super certain that you can win, you will likely accept that one, just because it seems &quot;safer&quot;.<p>There are a LOT of cases like this, just most of them don&#x27;t gain this publicity. Actually, 95% of court cases never reach court because of this. Innocent people plead guilty because they don&#x27;t have the wealth and resources to win in court. USA is a shithole when it comes to law enforcement. Medieval and sad. Land of the free (as long as you are rich, that is).
评论 #22293406 未加载
评论 #22292909 未加载
评论 #22294128 未加载
searcher1over 5 years ago
If you&#x27;re wondering why a web host, who could potentially be immune to prosecution under CDA 230, was charged with the distribution of child pornography, according to the warrant [1] an admin of one of the pedo sites claimed that Freedom Hosting had &quot;full control&quot; over the websites (well, he had root access to the servers, but so did OVH), was patching the websites, that the pedo site hosting was free, and that he assumed that Marques covered the hosting costs as a service to the &quot;pedo community&quot;. Technically the prosecutors might have had to prove that he knew what the sites were hosting, but he did plead guilty. Hopefully the actual operators of the pedo sites are found and prosecuted, and not just this sysadmin.<p>[1] <a href="https:&#x2F;&#x2F;www.courtlistener.com&#x2F;recap&#x2F;gov.uscourts.mdd.247657&#x2F;gov.uscourts.mdd.247657.13.1.pdf" rel="nofollow">https:&#x2F;&#x2F;www.courtlistener.com&#x2F;recap&#x2F;gov.uscourts.mdd.247657&#x2F;...</a>
评论 #22292755 未加载
评论 #22293282 未加载
ohmygodelover 5 years ago
Running a hosting server for onion services, as was done in this case, is a terrible idea. It greatly increases the risk of deanonymization. The question is less how this hosting service was discovered and more how it ever stayed up long enough to become so notorious. Here&#x27;s why:<p>1. Each hidden service chooses a &quot;guard&quot; relay to serve as the first hop for all connections.<p>2. A server running multiple hidden services has a guard for each of them. Each new guard is another chance to choose a guard run by the adversary.<p>3. An adversary running a fraction p of the guards (by bandwidth) has a probability p of being chosen by a given hidden service. A hosting service with k hidden services is exposed to k guards and thus has ~kp probability of chosen an adversary&#x27;s guard. With, say, 50 hidden services, an adversary with only 2% of guards has nearly 100% chance of being chosen by one of those 50 hidden services.<p>4. The adversary can tell when it is chosen as a guard by connecting to the hidden service as a client and looking for a circuit with the same pattern of communication as observed at the client. Bauer at el. [0] showed a long time ago this worked even using only the circuit construction times.<p>5. The adversary&#x27;s guard can observe the hidden service&#x27;s IP directly.<p>The risk of deanonymization with onion services in general (i.e. even not using an onion hosting service) is significant against an adversary with some resources and time. Getting 1% of guard bandwidth probably costs &lt;$500&#x2F;month using IP transit providers (e.g. relay 8ac97a37 currently has 0.3% guard probability with only ~750Mbps [1]). And every month or so a new guard is chosen, yielding another chance to choose an adversarial guard. Not to mention the risk of choosing a guard that isn&#x27;t inherently malicious but is subject to legal compulsion in a given jurisdiction (discovering the guard of a hidden service has always been and remains quite feasible with little time or money, as demonstrated by Øverlier and Syverson [2]).<p>[0] &quot;Low-Resource Routing Attacks Against Tor&quot; by Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. In the Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007.<p>[1] &lt;<a href="https:&#x2F;&#x2F;metrics.torproject.org&#x2F;rs.html#details&#x2F;014E24C0CD21D2B9829E841D5EC1D3C415F866BF&gt;" rel="nofollow">https:&#x2F;&#x2F;metrics.torproject.org&#x2F;rs.html#details&#x2F;014E24C0CD21D...</a><p>[2] &quot;Locating Hidden Servers&quot; by Lasse Øverlier and Paul Syverson. In the Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
评论 #22292356 未加载
评论 #22295600 未加载
评论 #22294894 未加载
评论 #22294457 未加载
评论 #22294140 未加载
评论 #22293677 未加载
评论 #22293593 未加载
评论 #22292753 未加载
评论 #22293274 未加载
评论 #22299272 未加载
agoristenover 5 years ago
This report came out only a few months before he was caught: <a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;onions&#x2F;comments&#x2F;1guiav&#x2F;we_have_analyzed_tor_hidden_services_and_shown&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;onions&#x2F;comments&#x2F;1guiav&#x2F;we_have_anal...</a><p>He was likely de-anonymized through this technique or similar. The issue was that he trusted the Tor network to keep him anonymous and paid for the servers with his real identity.
评论 #22293839 未加载
评论 #22292504 未加载
评论 #22292185 未加载
jokoonover 5 years ago
Isn&#x27;t it rather trivial to find who is accessing a website if you can manage to monitor tor nodes? Just do some heuristic, to see when traffic happens, and over time, narrow down users.<p>If you&#x27;re the FBI and have the authority to monitor the whole internet, isn&#x27;t it trivial to catch any tor user?<p>Tor is still secure, but of course if you are the government and have skilled engineers, time and admin access to the internet infrastructure (by legit or covert means, I&#x27;m pretty sure the US can monitor traffic outside his jurisdiction), tor is not safe. But tor is still safe from countries other than the US, unless the US government have a problem with what you&#x27;re doing.<p>I would still be curious to see if tor does counter this problem by passively sending traffic to avoid this. Anyway I stand that there are 2 kinds of security: security against small bad actors, and security against competent, resourceful, big actors. The latter is usually impossible to get because it becomes extremely fastidious and complicated.
评论 #22293683 未加载
jasciiover 5 years ago
The central premise of the article is that there is no disclosure regarding the vulnerability used, suggesting the existence of some unknown zero-day exploit..<p>Various well documented analysis have linked this incident to &quot;EgotisticalGiraffe&quot;, a well known -- and since fixed vulnerability.<p>FUD or lazy journalism? I mean, at least read the subjects Wikipedia page before publishing something..
评论 #22291848 未加载
评论 #22291850 未加载
评论 #22291909 未加载
casefieldsover 5 years ago
Mirror: <a href="https:&#x2F;&#x2F;outline.com&#x2F;L8ebnZ" rel="nofollow">https:&#x2F;&#x2F;outline.com&#x2F;L8ebnZ</a>
ropiwqefjnpoaover 5 years ago
I mean, it&#x27;s not like he&#x27;s just some TOR user they were after, he ran a huge dark web hosting service. There&#x27;s so much traffic and data to work with, it was just a matter of time.
Causality1over 5 years ago
It&#x27;s strange to me that people who make a habit of doing fantastically illegal things on the internet are always so sloppy about it. Even if they don&#x27;t have the technical ability to break into their neighbor&#x27;s wifi or set up a long range antenna to connect to an open access point they can still get a burner smartphone and drive to a Starbucks. Back when I used to torrent my TV shows I didn&#x27;t even let my piracy laptop touch my home network and I never used that machine for anything other than downloading.
评论 #22291914 未加载
评论 #22291814 未加载
评论 #22291443 未加载
评论 #22291770 未加载
评论 #22291721 未加载
评论 #22292346 未加载
评论 #22291520 未加载
评论 #22291428 未加载
评论 #22291577 未加载
评论 #22291557 未加载
评论 #22291412 未加载
pier25over 5 years ago
OTOH if these techniques and vulnerabilities were made public it would benefit cybercriminals as they could defend themselves better.
评论 #22291487 未加载
评论 #22291145 未加载
评论 #22294503 未加载
评论 #22292605 未加载
评论 #22291663 未加载
评论 #22291413 未加载
SadWebDeveloperover 5 years ago
afaicr the bug used was the one reported as MFSA 2013-53 aka CVE-2013-1690[1] but someone correct me if m wrong.<p>[1] <a href="https:&#x2F;&#x2F;www.mozilla.org&#x2F;en-US&#x2F;security&#x2F;advisories&#x2F;mfsa2013-53&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.mozilla.org&#x2F;en-US&#x2F;security&#x2F;advisories&#x2F;mfsa2013-5...</a>
评论 #22296494 未加载
rahuldottechover 5 years ago
Hacker Factor has a series of articles about various attacks on Tor: <a href="https:&#x2F;&#x2F;www.hackerfactor.com&#x2F;blog&#x2F;index.php?&#x2F;archives&#x2F;868-Deanonymizing-Tor-Circuits.html" rel="nofollow">https:&#x2F;&#x2F;www.hackerfactor.com&#x2F;blog&#x2F;index.php?&#x2F;archives&#x2F;868-De...</a><p>The tor daemon really needs to be re-written and audited. Apparently the codebase right now is a huge mess.
评论 #22291551 未加载
评论 #22291622 未加载
评论 #22291433 未加载
评论 #22292562 未加载
Pigoover 5 years ago
The military needs, or needed, Tor to be functioning and anonymous for their own use, correct?
评论 #22291885 未加载
评论 #22291737 未加载
评论 #22291249 未加载