This just in! The FBI is cracking TOR anonymously.
Tor is a network or open-source software that allows you to surf the web anonymously. It achieves this by accepting connections from the public Internet, or â€œclearnetâ€ and encrypting the traffic and bouncing it through series of computers before dumping it back on the web through any of the over 1100, â€œexit nodes.â€
This network was a place for people with privacy concerns to go to, but it was recently discovered that criminals for drugs, child porn, and murder contracts are all using the network.
The system also supports hidden services like websites that make users physical location untraceable. However, once you visit one of these websites, the FBI will trace your every activity legally.
An articled by Wired, revealed a technique called â€œdrive-by-downloadâ€ under â€œOperation Torpedoâ€ which is being used by the FBI to target TOR users. Wired writes that, â€œa hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.â€
TOR recently confirmed that someone is exploiting TOR Network in order to de-anonymize users. It is now discovered that the FBI is behind the hacking, and no one can deny the hack as the FBI maintains a Legal Search Warrant.
It is rumored that the FBI is using a malware technique called network investigative technique, or NIT. This technique gives the FBI access to your files, location, web history, and webcam for a month at a time.
This story highlights an overall privacy concern emerging; even when a network advertises its privacy there is always a hacker finding a way around it. It is now more important than ever to protect and secure your files.
For more information about TOR and FBI backdoor access, please feel free to contact us. You can reach us by phone, or send us an email. Our team is dedicated to providing clients with the top protective and security strategies.