Preliminary analysis of hacking team's slides

https://blog.torproject.org/blog/preliminary-analysis-hacking-teams-slides


Comments


[2 Points] None:

What a surprise...


[1 Points] None:

A tor exploit / deanonymization must be like the holy grail of hackers and security researchers.


[1 Points] AllJoociedUP:

Wow. These guys are sooo smart. (Sarcastically) How are they going to target someone who is already using TOR? Or better still target someone from TOR and find out who they are by exploit their normal web browser? Better still most users on here use Tails. Bingo Bango. Easy fix is shut down your Tails Machine. Wipe the RAM.

This does however tell us about some good OPSEC practices. Disabling Javascript, shutting tails down after use, Using VPNs to tunnel traffic. Even on my normal machine I am always connected to a VPN when online. Unless they somehow are targeting me, they would need to exploit my router to to infiltrate and intercept packets and resend malicious packets to do some damage. Even still good luck getting through my firewall without a Mac ID that is not predefined on the main network. The 'hidden' guest network is for my DN browsing.


[1 Points] teksquisite:

Wikileaks released a searchable email archive - interesting too: https://wikileaks.org/hackingteam/emails/


[1 Points] dirufa:

So, definitely not a "TOR exploit".