Law enforcement agencies in Germany have monitored Tor servers for months to identify individual users. The agencies managed to identify a server of the ransomware group Vanir Locker that the group operated from within the Tor network.

The group announced that it would release copied data from one of its latest coups on the server. Law enforcement agents managed to identify the location of the server by using a technique that is called Timing Analysis.

Reporters from ARD, a publicly financed broadcasters, were able to view documents that confirmed four successful identifications in a single investigation, according to reports. Agencies used the technique to identify members of a child abuse platform.

    • BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      17
      ·
      3 months ago

      Thanks for the link.

      I kinda figured this story was FUD from the start.

      Turns out the person they were able to locate was running an outdated tool lacking the security mechanisms of an updated version.

      • LWD@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 months ago

        It is very frustrating that the article references, but does not explain any of its discrepancies with, the Tor Project response post.

        If the author trusts the response post enough to reference it and link to it uncritically, they need to trash and rewrite the article from scratch. If the author does not trust them, they need to say so.