Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit here or GitHub Ξ
Ξ If you're looking for tutorials/guides, check out the new https://cryptostorm.is/#section6 Ξ

#Torsploit takedown: analysis, reverse engineering, forensic

To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.

Guest

Re: #Torsploit takedown: analysis, reverse engineering, fore

Postby Guest » Thu Aug 15, 2013 5:02 pm

Guest wrote:
Jack wrote:Should I be expecting a knock on the door by the FBI ?
I did open a lot of .onion sites on that day and at least one or two of them mus have been on freedom hosting. I was using the vulnerable browser with default settings.


It would take sometime for the FBI to compile the list, get the names and such from the providers, and then do a risk analysis of some kind as to who they should get. They will probably do token raruds and arrests, butleave the rest to the states to prosecute.

Thta means you have time to clean up your computer, but depending on what sites you wnt to and how many people they have, you can probably expect a raid within the next few months. If you can get to next summer without being raided, they may not bother with you at all, but your name is on their list.


My guess is there is a good chance nothing is going to happen, seeing as how they been completely exposed. I'm assuming this was an attempt to locate site owners and or active members


Guest

Re: #Torsploit takedown: analysis, reverse engineering, fore

Postby Guest » Sun Apr 03, 2016 7:29 am

Seems overly optimistic to assume nothing is going to happen. I agree they will probably target the most active people and/or site admins, but that would be wholly dependent on how many people got snared to begin with. It does seem pretty odd for them to let themselves be known so early in an investigation. I imagine there are a lot of people filling local landfills with their old computer equipment. This begs a few questions though. Are they banking on people's complacency based on the fact that the IP was not definitively traced back to any known LEA? OR Perhaps are they justconfident enough in the info that was gathered that evidence dumping won't be much of a hindrance? I would say if you visited an illegal compromised site in that time window, expect a friendly visit in the next 6 months. Maybe by some miracle your ISP would have dumped its IP logs before the subpoena hits. I wouldn't hold my breath though.


Last bumped by Anonymous on Sun Apr 03, 2016 7:29 am.


Return to “cryptostorm reborn: voodoo networking, stormtokens, PostVPN exotic netsecurity”

Who is online

Users browsing this forum: No registered users and 4 guests

cron

Login