Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.
Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.
The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it’s also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants. Critics also worry about mission creep, the weakening of a technology relied on by human rights workers and activists, and the potential for innocent parties to wind up infected with government malware because they visited the wrong website. “This is such a big leap, there should have been congressional hearings about this,” says ACLU technologist Chris Soghoian, an expert on law enforcement’s use of hacking tools. “If Congress decides this is a technique that’s perfectly appropriate, maybe that’s OK. But let’s have an informed debate about it.”
2More
On net neutrality, Internet providers are betrayed by one of their own | Ars Technica - 2 views
2More
Best Free Audio Converters for Windows - Icecream Tech Digest - 0 views
1More
PiJuice - A Portable Project Platform For Every Raspberry Pi by PiJuice - Kickstarter - 0 views
2More
Universal Music Can Delete Any SoundCloud Track Without Oversight | TorrentFreak - 0 views
2More
Silicon Valley startups discover power of political lobbying | ITworld - 0 views
2More
France Implements Administrative Net Censorship | La Quadrature du Net - 0 views
2More
The War Over Control Of The Net Is A War Over Information Advantage | TorrentFreak - 0 views
2More
5 Linux Command Line Based Tools for Downloading Files and Browsing Websites - 0 views
3More
TPP vs. Democracy: Leaked Draft of Secretive Trade Deal Spells Out Plan for Corporate P... - 0 views
1More
How a group of neighbours created their own Internet service | Ars Technica UK - 0 views
3More
Why open source has been a tremendous accelerator for Monsanto | The Enterprisers Proje... - 0 views
7More
Exclusive: Tim Berners-Lee tells us his radical new plan to upend the - 1 views
1More
Money And Power: The Real Reason For The NSA Spying On Everyone | Techdirt - 1 views
« First
‹ Previous
61 - 80 of 322
Next ›
Last »
Showing 20▼ items per page