TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The bomb-hoaxing Harvard student was using Tor, but they caught him anyway

50 pointsby jpbutlerover 11 years ago

20 comments

chimeracoderover 11 years ago
Amusingly, the original FBI affidavit was posted yesterday with a similar title, but it was changed to &quot;FBI Affidavit in Harvard Bomb Hoax [pdf]&quot;.<p>The submitter of yesterday&#x27;s post joked,<p>&gt; I guess I should have written a paragraph&#x27;s worth of inane blog spam to get my submission title used? I was trying to make this exact point in my original title. The title my submission was assigned is not the real title of the PDF either... seems very arbitrary.[0]<p>I completely understand the desire not to editorialize discussions. That said, this is an interesting case study of how the title of the submission very strongly affects the actual discussion that unfolds. After the title was changed, more of the comments revolved around the actual bomb threat itself, rather than the security benefits (and caveats) of Tor.<p>[0] <a href="https://news.ycombinator.com/item?id=6925289" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=6925289</a>
评论 #6928536 未加载
评论 #6928545 未加载
srlover 11 years ago
It&#x27;s worth remembering that security (here including the information security involved in hiding identity) is not boolean. The value of the prize matters. A penny (or a diary) hidden under a mattress can be considered &quot;secure&quot; - three million dollars can&#x27;t, especially when people know you have those three million somewhere.<p>The first mistake this guy made was doing something that made the authorities want to know who he was, and have a good excuse for expending enormous resources (if necessary) to do that. Had he used TOR correctly, it would have been harder for them, but it&#x27;s very likely they would still have succeeded.<p>Plenty of people here are making comments that sound suspiciously like advice for breaking the law. I realize that that&#x27;s not actually the case -- lessons taken from somebody who did something illegal and got caught can be perfectly applicable to someone trying to do something legal, privately. We all should be aware, though, that TOR and other privacy tools (and other non-privacy tools, like bittorrent) have a reputation for being designed for criminals, and it&#x27;s not a good idea to seem to sympathize too strongly with people who use TOR to send in bomb threats.
评论 #6928502 未加载
thebossover 11 years ago
The very BEST slideshow about using Tor to stay anonymous. You&#x27;ll see his mistake in it.<p><a href="http://www.slideshare.net/grugq/opsec-for-hackers" rel="nofollow">http:&#x2F;&#x2F;www.slideshare.net&#x2F;grugq&#x2F;opsec-for-hackers</a>
评论 #6928524 未加载
评论 #6928409 未加载
thoughtsimpleover 11 years ago
Fail a test, no big deal. Send a bomb hoax, ruin your life. Interesting choice. I thought Harvard students were supposed to be smart not just arrogant.
评论 #6928626 未加载
评论 #6928652 未加载
评论 #6929329 未加载
jstalinover 11 years ago
Also keep in mind that, from my understanding, he was confronted with this information and then admitted that it was him. This just reinforces the rule... never talk to the police.
评论 #6928332 未加载
评论 #6928363 未加载
评论 #6929788 未加载
nmcover 11 years ago
To be sure about <i>who knows what</i> when you use TOR, there is this excellent EFF article [1].<p>[1] <a href="https://www.eff.org/pages/tor-and-https" rel="nofollow">https:&#x2F;&#x2F;www.eff.org&#x2F;pages&#x2F;tor-and-https</a>
评论 #6928533 未加载
gaoshanover 11 years ago
It sounds like they merely looked for who had accessed a Tor network, not that they could tell anything about the communication. Kind of like, &quot;We know the perpetrator entered the grounds through the east gate prior to 9:00am. Security footage shows only 1 person doing that so go talk to him&quot;.
评论 #6928710 未加载
ck2over 11 years ago
So basically idiotic &quot;pranks&quot; that would have been done in high school have now moved to colleges costing tens of thousands a year?<p>You really have to have a shallow life experience to think a bomb threat to get out of an exam is even remotely an okay idea.
评论 #6928726 未加载
评论 #6928616 未加载
kmlymiover 11 years ago
I think it&#x27;s because he was the only one accessing TOR on a monitored network during the specific time.
评论 #6928321 未加载
评论 #6931210 未加载
millzlaneover 11 years ago
They caught him because he was signed into the wifi network using his personal credentials. Had he went to a Starbucks or McDonalds we&#x27;d be having a different discussion.
评论 #6928593 未加载
dansoover 11 years ago
Back when the whole Snowden&#x2F;NSA thing blew up, people talked about switch to TOR all the time to keep safe. The problem is, you kind of have to be disciplined and commit to it...and <i>even if that&#x27;s the case</i>, you might be exposed by uncontrollable environmental variables. The apparent problem in this case was that the student was using Tor at the time of the incident...and I&#x27;m assuming he was one of the very few to have been using Tor at that time, and he didn&#x27;t use it <i>all</i> the time...which makes his Tor usage at the time of the email stick out.<p>Obviously, he should&#x27;ve just not done it from Harvard&#x27;s network (and obviously, he shouldn&#x27;t have done it at all)...but I think it&#x27;s a good lesson when teaching others about security...know the conceptual limits of the black box you choose to use.
gueloover 11 years ago
It&#x27;s been a while since I was in the network security and monitoring world so I&#x27;m wondering what this monitoring software looks like. It sounds like it has the capability to keep a historical log of the type of traffic associated with each wifi-authenticated user. How detailed is the traffic analysis? How is the data recorded and for how long?
crb002over 11 years ago
So if Guerilla Mail had a chron option to buffer mail and avoid temporal correlation he would have walked?
评论 #6928303 未加载
评论 #6928362 未加载
njharmanover 11 years ago
Easy to forget &quot;Anonymous&quot; strongly does not equal &quot;Untraceable&quot;.
Theodoresover 11 years ago
He would have had better luck cutting letters out of a newspaper, sticking them to a page and popping it in the post.<p>However that is not without its hazards. He would need to evade CCTV and make sure he did not take his cell phone with him to the post box. The stationary he used would also have to be untraceable, so a stack of identical envelopes at home would not be ideal. He would also need an alibi lest any neighbours end up why he was posting letters at 4 a.m.
评论 #6928596 未加载
sp332over 11 years ago
I think I just decided to use TOR as often as possible.
评论 #6928350 未加载
fab13nover 11 years ago
There&#x27;s always an official good reason why some Tor user gets busted by the Feds, and it&#x27;s never that Tor itself is pwned. It reminds me of Brits trying not to show that they pwned Enigma during WWII.<p>If I needed to be shielded from the Feds, and I depended on Tor for this, I&#x27;d feel increasingly nervous.
RankingMemberover 11 years ago
&quot;Kim told the FBI he trying to avoid taking a final exam.&quot;
评论 #6928576 未加载
methodinover 11 years ago
As an aside, do we think that as online courses become every more prevalent that we will see an equivalent of this in the form of DOS attacks?
joshguthrieover 11 years ago
The weakest link is always the end-user.