Skip to main content

FBI Claims They Breached Tor Security Without Malware

 

The Federal Bureau of Investigation has announced the tools they used to get PlayPen members convicted was not malware. After refusing to disclose the methods use when ordered to by a judge, a lot of the FBI’s evidence was thrown out. Despite all of that, law enforcement officials continue to deny their network investigative technique uses malware.

FBI STILL REFUSES TO PROVIDE PROOF

The issues between the FBI and PlayPen convicts is far from resolved, as judges continue to offer contradicting rulings. One judge in Virginia ruled how the case against PlayPen member Edward Mathis should stand, regardless of how the evidence was gathered. Not too long ago, a different judge ruled against using FBI evidence in a similar case; the law enforcement agency refused to disclose details.

 

But the FBI is still not proving any insights as to how their network investigative technique works. One spokesperson told the media on Wednesday how they are not using malware, yet failed to provide any evidence to back up these claims. While no one is asking them to explain everything from a to z, some insights would be more than welcome.

 

Mathis, who will not have the case against him dismissed, felt he was being coerced into signing a statement detailing his crimes. However, the Virginia judge ruled there was no evidence to support these claims. However, there is the question of how the FBI obtained the evidence against this person, as well as the 134 other PlayPen members.

 

Revealing the true IP address of a Tor user is next to impossible with an exploit or malware. The FBI’s network investigation technique managed to do exactly that, albeit many feel the warrant for taking down PlayPen did not give them the legal right to use the malicious or illegal software.

 

This investigation may come around to bite the law enforcement agency in the rear, though. In a previous case, the FBI revealed the source code of their NIT tool. While this software does not alter security settings of target computers, the lines are blurring as to which part of that explanation suddenly makes it alright to deliberately infect consumer devices.

 

Comments

Popular posts from this blog

What is iDice?

iDice is a dice betting Dapp fueled by the use of the Ethereum organize. eg. iDice lets in players do several things and having such an innovative new token on the ETHEREUM Platform, we had to write an article about this new project. Guess on the space by the use of keeping up iDice tokens and best of all 100% of all benefit iDice acquires is dispersed among token holders, related to the amount of tokens they dangle. iDice amusement code is decentralized and changeless. Such gigantic building fees highlight a rising requirement for experienced, fair and cast Dapps. iDice iDice is an control which gives a provably affordable and simple, virtual Ethereum dice betting Dapp. The house edge will be set intensely and token holders have an atypical esteem that is dependably equiva- loaned to the house edge. iDice has a fully simple provide code accessible at etherscan.io. The payout of recreations is many times speedy. Provably Fair iDice uses open provide blockchain...

Spanish Banks Form New Blockchain Consortium

A group of Spanish banks has formed the country's first blockchain consortium. Wholesale bank Cecabank announced the effort today, partnering with professional services firm Grant Thornton. Who's involved: In its announcement, Cecabank doesn't say which other institutions are taking part, stating that it "comprises 33% of the Spanish banking sector". However, according to Spanish newspaper El Pais, the group's membership includes Abanca, Bankia, CaixaBank, Kutxabank, Ibercaja, Liberbank and Unicaja. It represents the first major foray into blockchain for these companies, as other Spanish banks, including Banco Santander and BBVA, have been working with the tech for some time. What they're saying: Thus far, only Cecabank has commented publicly on the consortium effort, describing it as a way for its employees to get a top-down understanding of the tech – as well as possible insight into how the bank might actually go about using it. "Employees of all o...

Ethereum Smart Contract Issues Frustrate Developers with Fatal Bugs

Only weeks after the execution of a hard fork to mitigate various DoS (denial-of-service) attacks, the Ethereum network and its developers are struggling to deal with yet another major flaw. This time, major issues in regards to smart contracts have emerged, which have rendered the efforts of decentralized applications in the Ethereum network purposeless. On November 1, the Ethereum development team and the founder of Solidity warned users and developers against a bug that allowed variables to be overwritten in storage. Variables in a smart contract are agreements made between two or more parties. Thus, if an attacker can gain access to the storage and alters the variables, crucial agreements in decentralized applications can be affected and funds may be extracted, which may pressure developers to discard previous smart contract-based projects to recompile contracts. Ethereum developers including Ansel Lindner stated that the development of an Ethereum application is failing to opera...