EFTA00995507
EFTA00995508 DataSet-9
EFTA00995510

EFTA00995508.pdf

DataSet-9 2 pages 426 words document
P17 V16 V10 P19 D8
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (426 words)
From: "jeffrey E." <[email protected]> To: Vincenzo Iozzo >, Joi Ito Subject: Re: de-anonymize tor/bitcoin Date: Sat, 23 Aug 2014 10:34:26 +0000 http://www.foxnews.corn/politics/2014/08/22/food-stamp-fraud-rampant-gao-rew_rt/ make food stamps a test bed for transparant cyryto? govt on our side On Sat, Aug 23, 2014 at 5:54 AM, Vincenzo Iozzo fl > wrote: Jeffrey, this stuff is a bit heavy but if you care for it here are a couple of links: I) One obvious technique to de-anonymize tor is to control the 'exit nodes', meaning the nodes that connect Tor to the Internet. If you control enough of them you can de-anonymize a lot of it. 2) A friend of mine (among other people), found ways to de-anonymize a lot of the 'hidden services' (roughly the 'secret' websites inside tor) much more efficiently. I believe Tor fixed those flaws by now, but it's a pretty ingenious attack: http://www.ieee-securityrg/TC/SP2013/papers/4977a080.pdf The bottom line there is that with roughly Silk you can realistically de-anonymize any hidden service on tor. You do that by 'pretending' to be one of the servers handing out the addresses of the hidden services 3) The third option is to just attack the machine(s) of the 'bad guys', this is for instance what the FBI did a while ago against a network oh pedophiles: http:/Avww.reddit.corn/r/onions/comments/1jmrta/founder_of the_freedom_hosting_arrested_held/ This option is targeted but it always works. The trick there was to attack the computer and then have the computer connect to a non-tor website, by doing that they could get the IP address and de-anonymize the user. Of course once you have control over the machine you can do much more that that, but they sticked to that As for bitcoin itself, I believe I sent you the Bitlodine paper. Another very good one is this: http://cseweb.ucsd.edut-smeiklejohn/files/imc13.pdf Now some of these approaches are probabilistic, (3) is not. But I guess my point is: if you *really* want to figure out what somebody is doing on tor/bitcoin you can do it given enough resources. Not that it matters too much, but well please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation®gmail.com, and EFTA00995508 destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00995509
ℹ️ Document Details
SHA-256
c23d91b35b6bfe17bce3b5e789a15e0b24193d8c7c120810e74dbead4c8c9587
Bates Number
EFTA00995508
Dataset
DataSet-9
Document Type
document
Pages
2

Comments 0

Loading comments…
Link copied!