{"id":169771,"date":"2014-12-27T11:59:14","date_gmt":"2014-12-27T16:59:14","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/what-you-need-to-know-about-tor-and-the-hackers-targeting-it.php"},"modified":"2014-12-27T11:59:14","modified_gmt":"2014-12-27T16:59:14","slug":"what-you-need-to-know-about-tor-and-the-hackers-targeting-it","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/tor-browser\/what-you-need-to-know-about-tor-and-the-hackers-targeting-it.php","title":{"rendered":"What you need to know about Tor and the hackers targeting it"},"content":{"rendered":"<p><p>    Image: Elizabeth Pierson, Mashable  <\/p>\n<p>      By Rex Santus2014-12-27      01:56:41 UTC    <\/p>\n<p>    There are a lot of tools online that claim to offer you total    privacy. But when dealing with something like Internet    anonymity, it's hard to be sure.  <\/p>\n<p>    One that's widely agreed to be among the best available is    Tor. If used    correctly, the Tor browser and network cloaks online activity    in anonymity; your online traffic isn't traceable back to you.    It's less about keeping credit card numbers secure and more    about allowing you to browse the web and communicate with    others without revealing who and where you are.  <\/p>\n<p>    But Tor was attacked on Friday. The hacker group known as    Lizard Squad  or at least a Twitter account claiming to be    involved with the collective  said that it was going after    Tor. According to Tor, which has confirmed the attack, but not    the perpetrator, there should be no effects on anonymity or    performance. But some experts have speculated that the hackers    could track the network's users.<\/p>\n<p>    This comes one day after the hackers took credit for shutting down the    PlayStation Network and Xbox Live. The group has claimed    responsibility for numerous hacking attacks. It's not entirely    clear if Lizard Squad is actually behind all of these hacks, or    if the Tor attack is actually being carried out by the group.  <\/p>\n<p>    Tor's developers openly admit it isn't bulletproof. But nothing    is. A report from Wired earlier this month, for    example, said the FBI used a hacking app called Metasploit to    successfully identify users hiding behind Tor in 2012, and    \"theres evidence the FBIs anti-Tor capabilities have been    rapidly advancing.\"  <\/p>\n<p>    Just last week, Tor heard word of a possible attack to disable    the network by seizing \"specialized servers,\" according to a    post on Tor's website. Whether the new    attack is connected to these concerns is unclear.  <\/p>\n<p>    \"Any tool that says they are 100% secure all the    time, they are not being accurate,\" Tor's development    director Karen Reilly told Mashable in an interview    earlier this month.  <\/p>\n<p>    Now for a look at Tor: What it is, how it works and what the    cyberattack could mean for its users.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/mashable.com\/2014\/12\/26\/what-is-tor\/?utm_campaign=Mash-Prod-RSS-Feedburner-All-Partial&utm_cid=Mash-Prod-RSS-Feedburner-All-Partial&utm_medium=feed&utm_source=rss\/RK=0\/RS=SOWkWWvYFiQa6wrUv453NFc3QJ4-\" title=\"What you need to know about Tor and the hackers targeting it\">What you need to know about Tor and the hackers targeting it<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Image: Elizabeth Pierson, Mashable By Rex Santus2014-12-27 01:56:41 UTC There are a lot of tools online that claim to offer you total privacy.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/tor-browser\/what-you-need-to-know-about-tor-and-the-hackers-targeting-it.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261457],"tags":[],"class_list":["post-169771","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/169771"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=169771"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/169771\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=169771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=169771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=169771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}