Operation Tornado turned out to a successful one for FBI with arrests of over 14 individuals.
Wow, the credibility of TOR developers sure seems in question then.
(Or, maybe not.)
Daniel December 17, 2014 1:06 PM@ Tim, @Bob S.
I see both sides of this.
@jggimi
Yes, but that isnt the real point of the article either.
The real point is in the last paragraph.
(For the 2013 attack, that was browsing with an old version.)
All in all, not a surprise.
Nick P December 17, 2014 8:40 PM@ HomerJ
Thats actually what I proposed.
I had two different models.
The centralized model meant you werent anonymous to the service provider (eg Anonymizer).
They just used strong mechanisms to make you anonymous to everyone else.
If a warrant is provided, they give over the data.
Their own activities and systems are independently audited by mutually suspicious parties.
Any accesses also generate audit logs that can be checked later on.
I also proposed a decentralized model with features akin to a discussion board or stackoverflow.
The content is hosted on something akin to hidden services with an identifier.
The police can suggest they be deanonymized.
If they vote, the protocol will do so.
Otherwise, it wont.
It also discourages use of online grid for such content.
Theres going to be a constant battle between authorities and privacy lovers over anonymity technology.
Its worth putting research into.
In Freedom Hosting operation, FBI even succeeded in revealing visitors MAC addresses in addition to the IP addresses.
source: www.techworm.net