<<  >> (p.377)
    Author Topic: BTCD is no more  (Read 1328526 times)
    Cassius
    Legendary
    *
    Offline Offline

    Activity: 1764
    Merit: 1031


    View Profile WWW
    November 12, 2014, 12:49:38 PM
     #7521

    Been reading a bit about what TOR is going through regarding attacks and site seizures by the EU and US Feds.

    One comment on the thread states a possible vulnerability to BTCD and superNet IMO: "My speculation about what happened follows. The attacker floods a particular hidden service with random/innocent GET requests at a chosen time. The network links are monitored for that flood pattern. Then the suspected servers are unplugged briefly, and the attacker checks which HS goes down at the exact same time. Now the search for evidence actual begins. It is a very simple and effective attack, particularly against low-traffic servers."

    TOR discusses some points of attack in the following thread. Worth a read for thinking about if any of the proposed issues may affect the BTCD network:

    https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous/

    Would be interested to hear more about this. However, the simplest explanation is often the best. It looks like some of the guys who got busted weren't exactly careful (email address hidden in site code, for example). Following the bitcoin paper trail probably got plenty of info too. Then the cops over-stated their success and the media picked it up...
    I suspect there's nothing too profound going on here.
Page 376
Viewing Page: 377