It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Tor Project, the not-for-profit group behind the technology, said on Wednesday that academics from Carnegie Mellon University made “at least $1 million” by helping the FBI de-anonymize Tor users earlier this year during the course of a criminal investigation.
“Such action is a violation of our trust and basic guidelines for ethical research. We strongly support independent research on our software and network, but this attack crosses the crucial line between research and endangering innocent users,” Tor said in a statement.
Tor allows users to stay relatively anonymous online by routing Internet traffic through various nodes around the world, in turn making it difficult for eavesdroppers to see where users are located or the websites they visit. It’s popular among whistleblowers, journalists, human rights workers and law enforcement officials who use the tool to mask their online activity, as well as individuals in repressive regimes where access to online content is restricted by the government.
www.washingtontimes.com...
The FBI caught the man accused of creating Silk Road -- the shadowy e-commerce site it describes as "the most sophisticated and extensive criminal marketplace on the Internet today" -- after he allegedly posted his Gmail address online, according to court documents.
Federal agents swooped on Ross William Ulbricht in a San Francisco public library Tuesday afternoon, charging the 29-year-old American with narcotics trafficking, computer hacking and money laundering. They allege he is "the Dread Pirate Roberts," the Silk Road's mysterious founder, who drew his pseudonym from the feared, fictitious character in the film The Princess Bride.
www.cnn.com...
But since we don’t know who wrote Tails, how do we now it isn’t some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide; if it’s bad for the NSA, it’s safe to say it’s good for privacy. And all of the Tails code is open source, so it can be inspected by anyone worried about foul play. “Some of us simply believe that our work, what we do, and how we do it, should be enough to trust Tails, without the need of us using our legal names,” the group says.
Although Tails includes productivity applications like OpenOffice, GIMP and Audacity, it doesn’t make a great everyday operating system. That’s because over the course of day-to-day use, you’re likely to use service or another that could be linked with your identity, blowing your cover entirely. Instead, Tails should only be used for the specific activities that need to be kept anonymous, and nothing else.
www.wired.com...
originally posted by: wasaka
They did not find Edward Snowden and that is
because he used the Tails operating system
in addition to TOR.
originally posted by: jobless1
a reply to: wasaka
I honestly believe TOR is still safe because They "government" would never suggest it isn't safe anymore if it wasn't safe they would simply just catch the people using it and never say a word or tell people how TOR keeps criminals safe but they cant stop it lol. However I believe Bitcoin isn't safe anymore! plain and simple.
originally posted by: jobless1
a reply to: wasaka
bitcoin is the engine that runs the black market
without bitcoin you cant hide the transactions from website to consumer
hence bitcoin isn't safe.
Even you should know the MT GOX was hacked which distributed the transactions.
This is effectually known as a man in the middle attack.
man in the middle attack:One example is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. However all they have to do is watch the connection between the transaction and trace it to the Ip address
I believe free software that holds the bitcoins known as a bitcoin wallet you need to link it with an email address! Unless you spoof your ip address and mac address while making the email and link to a public network while making a transaction your screwed.
For long-term storage of bitcoins (or giving as gifts) it's not safe to store your bitcoins in an exchange or online wallet. These types sites are regularly hacked. Even keeping a live wallet on your own computer can be risky.
By printing out your own tamper-resistant bitcoin wallets and generating your own addresses, you can minimize your exposure to hackers as well as untrustworthy people in your home or office. Just transfer your bitcoins into your new wallets, and use common sense to keep your wallets safe the way you would jewels and ordinary cash. Or give them away!
bitcoinpaperwallet.com...
originally posted by: stuthealien
the talk talk hackers used tor and tails and still got caught,so think again !!!