Funny thing about the SSL hack

is that the hack was tested by acting as a node in the Tor network.. Isnt it ironic?

As an experiment, Marlinspike placed his proxy software on a node in the Tor network and intercepted 200 requests for SSL encrypted pages over 20 hours, including 114 Yahoo! credentials, 50 Gmail credentials and 16 credit-card numbers. None of the users refused to enter their sensitive information into the unencrypted page, he said.
Man-in-the-middle attack sidesteps SSL

A man in the middle attack using a proxy is quite obvious (although I do not seek to minimalise the hack, really!) but getting the user to actually use the proxy is the tough part πŸ™‚ This will work for people on your network (so you can actually force them to use that proxy if they want to go onlune) or maybe if you can persuade some dumb fuck to use that proxy for whatever reason, .. So thats not that easy. But if you go on acting as a tor node, routing packages for strangers, you ve got all this trafic passing through, people logging in & all that .. Routing that traffic through your tweaked proxy solves the “how to ..” part πŸ™‚

And the funny thing is, that Tor is all about “Anonymity Online” πŸ™‚ So its people who take this effort to surf Annonymous getting hacked, losing their email & facebook credentials (and more) and thus losing all annonymity & privacy πŸ™‚

Yes, it is!

Published by Gert

Person-at-large.

One thought on “Funny thing about the SSL hack

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: