Tuesday, August 6, 2013

postheadericon Tor 'deep web' servers go offline as Irish man is held over child abuse images

man accused of being behind Freedom Hosting, a provider of services in many hiding places, battles U.S. extradition request for FBI

Freedom Hosting, united by the FBI images of child abuse, went online, as the FBI has requested the extradition of a suspect 28-year-old from Ireland.

Eoin Eric

Brands been a U.S. arrest warrant for the distribution and promotion of child pornography online.

denied bail by the Supreme Court in Dublin, the Irish Independent reported, pending a decision on the extradition request. Brands, which is both a U.S. and Irish nationality, will face the Supreme Court again on Thursday.

If extradited to the United States, Brands faces four counts related to images hosted on the network Freedom Hosting, including images of torture and rape of children. He could be sentenced to 30 years in prison.

Freedom Hosting network sites hosted The Onion Router (Tor), which encrypts traffic anonymous and conceal the identity of users.

whistleblowers, journalists and dissidents as well?

Sunday, the official blog of Tor published a detailed statement confirming that a large number of services meets "hidden" anonymous servers or network usage, unexpectedly disconnected.

Tor

rushed to distance themselves from freedom of accommodation, who claimed to be a center for the material of child abuse and the Silk Road - the eBay of hard drugs, saying that "People leading hosting freedom are in no way connected or associated with the Tor Project Inc., the organization that coordinates the development of the Tor software and research."

blogger and former Washington Post reporter Brian Krebs wrote on Sunday that users were identified with a default Firefox 17, which is based on the Tor browser.

Rik Ferguson, vice president of security research at Trend Micro, said he expected more details will be made public Brands is brought to justice, but the demolition and repression in relation "is great news for the fight against child exploitation."


"Malicious code was a" victim machine ", who visited one of the hidden sites involved, and asked for a website" visible "through HTTP, exposing their true IP address. As the exploit does not deliver malicious code, it is very unlikely that it was a cybercriminal operation.

Find best price for : --Defcon----DDos----anonymous----Hosting----Irish----Marques----Freedom--

0 comments: