Skip to main content
Skip to content
Case File
efta-02588447DOJ Data Set 11Other

EFTA02588447

Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02588447
Pages
2
Persons
0
Integrity

Summary

Ask AI About This Document

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Vincenzo lozzo Sent: Saturday, August 23, 2014 9:55 AM To: jeffrey E. Subject: de-anonymize tor/bitcoin Jeffrey, this stuff is a bit heavy but if you care for it here are a couple of =inks: 1) One obvious technique to de-anonymize tor is to control the 'exit =odes', meaning the nodes that connect Tor to the Internet. If you =ontrol enough of them you can de-anonymize a lot of it. 2) A friend of mine (among other people), found ways to de-anonymize a =ot of the 'hidden services' (roughly the 'secret' websites inside tor) =uch more efficiently. I believe Tor fixed those flaws by now, but it's = pretty ingenious attack: =ttp://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf The bottom =ine there is that with roughly $11k you can realistically de-anonymize =ny hidden service on tor. You do that by 'pretending' to be one of the =ervers handing out the addresses of the hidden services 3) The third option is to just attack the machine(s) of the 'bad guys', =his is for instance what the FBI did a while ago against a network oh =edophiles: =ttp://www.reddit.com/r/onions/comments/ljmrta/founder of the freedom host=ng arrested held/ This option is targeted but it always works. The trick there was to =ttack the computer and then have the computer connect to a non-tor =ebsite, by doing that they could get the IP address and de-anonymize =he user. Of course once you have control over the machine you can do =uch more that that, but they sticked to that As for bitcoin itself, I believe I sent you the Bitlodine paper. Another =ery good one is this: =ttp://cseweb.ucsd.eduhsmeiklejohn/files/imc13.pdf Now some of these approaches are probabilistic, (3) is not. But I guess =y point is: if you *really* want to figure out what somebody is doing =n tor/bitcoin you can do it given enough resources. Not that it matters =oo much, but well =?xml version=.0" encoding=TF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <pl ist version=.0"> <dict> <key>conversation-idgkey> <integer>299373</integer> <key>date-last-viewed</key> <integer>0</integer> <key>date-received</key> <integer>1408787676</integer> <key>flags</key> <integer>8590195717</integer> <key>gmail-label-ids</key> <array> <integer>6</integer> <integer>2</integer> </array> <key>remote-id</key> EFTA_R1_01769393 EFTA02588447 <string>433835</string> </dict> </plist> 2 EFTA_R1_01769394 EFTA02588448

Technical Artifacts (6)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainwww.ieee-security.org
Domainwww.reddit.com
Phone2588447
Phone2588448
Phone8787676
URLhttp://www.apple.com/DTDs/PropertyList-1.0.dtd

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,500+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.