This article was published on February 25, 2016

FBI reportedly forced researchers to hand over data that exposed TOR users


FBI reportedly forced researchers to hand over data that exposed TOR users

The FBI made a group of security researchers hand over their findings about the TOR anonymity network so that it could track users’ digital footprints, the BBC reports.

The two Carnegie Mellon University researchers’ data – after being subject to a court order – was used by the FBI to identify the IP address of Brian Farrell, who was arrested at the start of 2015 for being suspected of running the Silk Road 2.0 darknet site that sold illegal drugs. He denies the accusation and is still awaiting trial.

Before the arrest and other revelations that the NSA could crack TOR by monitoring exit node traffic, it had been thought that the network provided virtually untraceable internet access.

Delving into the darknet isn’t a rarity for law enforcement. The FBI was last week ordered by a federal judge to hand over source code for its hacking software that was used against other TOR users, in that (controversial) case people who accessed a site containing images and videos of child sexual exploitation being run from FBI servers in Virginia.

The 💜 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It's free, every week, in your inbox. Sign up now!

It’s likely the FBI would never have voluntarily revealed how it got access to TOR data without that court order.

The timing of this news couldn’t be much worse for the FBI, which has become embroiled in a very public dispute with Apple over providing access to users’ data.

US court case reveals Tor attack deal [BBC]

Get the TNW newsletter

Get the most important tech news in your inbox each week.

Published
Back to top