Law enforcement agencies in Germany have monitored Tor servers for months to identify individual users. The agencies managed to identify a server of the ransomware group Vanir Locker that the group operated from within the Tor network.

The group announced that it would release copied data from one of its latest coups on the server. Law enforcement agents managed to identify the location of the server by using a technique that is called Timing Analysis.

Reporters from ARD, a publicly financed broadcasters, were able to view documents that confirmed four successful identifications in a single investigation, according to reports. Agencies used the technique to identify members of a child abuse platform.

  • BearOfaTime
    link
    fedilink
    English
    arrow-up
    14
    ·
    9 hours ago

    Thanks for the link.

    I kinda figured this story was FUD from the start.

    Turns out the person they were able to locate was running an outdated tool lacking the security mechanisms of an updated version.

    • LWD
      link
      fedilink
      English
      arrow-up
      3
      ·
      7 hours ago

      It is very frustrating that the article references, but does not explain any of its discrepancies with, the Tor Project response post.

      If the author trusts the response post enough to reference it and link to it uncritically, they need to trash and rewrite the article from scratch. If the author does not trust them, they need to say so.