quarta-feira, 29 de abril de 2015

Your Tor-Based Email Isn't as Secure as You Think

A Recent Security Breach just Provided a Painful Reminder that, Tor's Anonymity Network Isn't Completely Foolproof against Truly Determined Intruders. The Email Service, SIGAINT, is Warning Users that Someone Recently Launched a Sustained Attempt to Break into its Servers and Snoop on Messages. While that Direct Attack Wasn't Successful, the Culprit also Tried Setting Up Malicious Exit Nodes (Where Data Reaches the Normal Internet) in Hopes of Spying on Messages the Moment they Left Tor. The Chances of actually Connecting to One of these Rogue Routers was Slim (about 2.7%) but, you Clearly Wouldn't Have Enjoyed Winning this Lottery. The Kicker ? The Campaign was probably Avoidable. SIGAINT Doesn't Encrypt its Normal Website, which Let the Perpetrator Get Away with the Impersonation Necessary for this Campaign.



The Service Tells Motherboard that, it Doesn't Lock this Website because it's Both a Hassle for Users and Ineffective against Fake Security Certificates but, that's Not Much Consolation if you're Affected. SIGAINT Hasn't Said Exactly What it will do but, it's Looking at Either Encrypting its Page or Pulling the Public Tor Link to Reduce the Chances of this Kind of Assault. It's Not Clear Who's Responsible and there's No Clear Evidence that, this was a Government Agency Trying to Spy on Drug Dealers and Terrorists. Given the Low Odds of Intercepting any Useful Messages, the Attack could just as Easily be the Work of Criminals Hoping to Get Lucky, or Even Someone Holding a Grudge. Whoever's at Fault, the Incident Suggests that, you'll Want to be Careful about Sending Sensitive Messages, No Matter How Secure you Think a Service Might be.




Info Sources:

http://motherboard.vice.com/read/after-hacks-a-dark-web-email-provider-says-a-government-spied-on-its-users?utm_source=mbtwitter

https://lists.torproject.org/pipermail/tor-talk/2015-April/037549.html



0 comentários:

Enviar um comentário