[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
http://news.softpedia.com/news/is-t he-fbi-hiding-a-firefox-
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 64
Thread images: 9
File: jeff-start-the-van.jpg (63 KB, 640x436) Image search: [Google]
jeff-start-the-van.jpg
63 KB, 640x436
http://news.softpedia.com/news/is-the-fbi-hiding-a-firefox-zero-day-503026.shtml

>thinking you are safe
>>
>>54065517
Nah /g/ is just paranoid thanks to all the pizza and bomb blueprints they got on their HDDs.
>>
>>54065517
shitfox morons BTFO once again
>>
Well shit.
It's time to abandon the http.
>>
>>54065852
Thats the real solution. The whole web is fucked. To maky normies anyways.
>>
>>54065517
Pretty sure I read they used a NoScript exploit.(Was posted on reddit I believe)

Basically, there's two ways users disable javascript. One is through about:config(proper way), and another is through NoScript.

Some users had javascript disabled in NoScript, but still had it enabled in the about:config. This would have lead to you being busted.

This is why you should never fully trust the addons you use, and definitely don't add more than what comes with the browser.
>>
>>54067307
Usenet resurgence?
>>
https://blog.torproject.org/blog/tor-browser-60a4-hardened-released

>Tor Browser still on 38.7.1 ESR
>not on 45.0.2 ESR

Not Firefox's fault
>>
>>54067553
>NoScript, Video DownloadHelper, Firebug, Greasemonkey, and FlashGot Mass Down all contained bugs that made it possible for the malicious add-on to execute malicious code.

http://arstechnica.com/security/2016/04/noscript-and-other-popular-firefox-add-ons-open-millions-to-new-attack/
>>
>>54065517

F O X A C I D
O
X
A
C
I
D

https://en.wikipedia.org/wiki/Tailored_Access_Operations#QUANTUM_attacks
>>
>>54067720
>relies on a compromised router
I'm pretty sure it's not this.
>>
File: NSA_quantum_cat.jpg (79 KB, 478x366) Image search: [Google]
NSA_quantum_cat.jpg
79 KB, 478x366
>>54067720

* ACTUAL NSA IMAGE
>>
File: 245px-XKeyscore_logo.jpg (16 KB, 245x199) Image search: [Google]
245px-XKeyscore_logo.jpg
16 KB, 245x199
>>54067793
>suggesting entire internets isn't compromised
>>
>>54067793
A compromised router that's near the target of the exploit.

Why do you think the NSA doesn't have this?
>>
>>54065517
As I understand pages on freenet do not contain js, also frost boards is just bbs based on xml or something like that
>>
>>54065517
What is a "zero-day" anyways? There are a bunch of videos that have mpv/vlc/mpc exploits but there's nothing about them in exploit-db.
>>
>>54067835
Freenet has it's own vulnerabilities and has been compromised since November 2015.

>>54067828
>A compromised router that's near the target
I didn't know it was a separate router. I figured they were distributing malicious routers to selected targets. Even so, this seems highly unlikely for how the 137 arrests were made. It's also been around since 2013.
>>
>>54067720
How would foxacid help in this situation though.

The FBI already had control of the server so they can deliver whatever content they wanted to the users.

Also doesn't TOR eliminate the ability to inject traffic since it's encrypted and hides the source of the user?
>>
>>54067906
>What is a "zero-day" anyways?
>A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack.

google my friend.

>There are a bunch of videos that have mpv/vlc/mpc exploits
it had nothing to do with mpv, vlc, or mpc. it was ffmpeg, which was patched almost as soon as it was found. im sure they've updated their libraries
>>
>>54067910
>freenet compromised
Source?
>>
>>54067910
>I figured they were distributing malicious routers to selected targets

Nope, they are compromising core routers on the internet to inject traffic to deliver exploits to you while browsing completely legitimate websites.
>>
>>54067941
Dude you're behind.

https://www.deepdotweb.com/2015/11/27/police-log-ips-making-arrest-by-planting-own-nodes-in-freenet/

>University of Dakota police officer who was arrested for downloading child porn from Freenet, the North Dakota Bureau of Criminal Investigation had been running an undercover operation in the network since 2011, planting their own nodes in the P2P file sharing service.

>With this done, the law enforcement authorities were able to log the IP of the users
> log the IP of the users

>The ex-police officer was charged with 10 counts of possessing child porn images, each count could mean 5 years to the man, which could result in 50 years of prison for Bradley.
>>
>>54067961
>deliver exploits to you
There's no mention of how these exploits are activated. Does it require javascript? Flash? What's the medium?

Something tells me they definitely can't just compromise any machine they want simply by viewing legitimate websites. Tor may as well be pointless to use in that case.
>>
>>54067936
>ffmpeg
No, I mean I have videos that have exploits for those. I don't use ffmpeg.
>>
>>54068059
>I mean I have videos that have exploits for those
Proof required.
>>
>>54067971
Thats a fluke, something about freenet connecting to closest nodes (by ping?). The guy was running a high bandwith node on university network in same town as the police. Possibly on same isp.
Not saying freenet is 100% secure but this doesnt mean is broken
>>
>>54068110
I can post dmesg logs of PAX killing vlc or mpv (mpv exploit is an embedded lua exploit).
>>
>>54068173
post the video you have that exploits mpv.

or even a tech article mentioning this.
>>
>>54068038
>Something tells me they definitely can't just compromise any machine they want simply by viewing legitimate websites. Tor may as well be pointless to use in that case.

TOR and https (mostly) prevents this from happening but yes, the NSA has the ability to do this on plain http and sites with broken https setups. See the wiki above.

But in this case it's not even necessary, the FBI controlled the website so there is no need for NSA fuckery.

>There's no mention of how these exploits are activated. Does it require javascript? Flash? What's the medium?

Some vulnerability in the firefox browser that they are able to exploit by you browsing a website they control?

TOR browser should have flash disabled so it's not likely to be that.
>>
>>54068116
>The guy was running a high bandwith node on university network
He was a university cop but I don't see anywhere that he was using the uni's network. Do you have access the court documents?

>When investigators carried out a search warrant earlier this month of UND police officer Meagher's apartment in the 1500 block of Eighth Avenue South

>Meagher's apartment
>Somehow running freenet on the universities network from his apartment
>>
>>54068198
>post the video
It has exploits that are probably from the FBI. If you want the video you'll have to look around through /b/ dropbox threads.
>>
>>54068226
>Some vulnerability in the firefox browser
>vulnerability in the firefox browser
So it still requires that the browser is compromised, which is what the entire thread is about. The whole Quantum attack was completely pointless to mention, especially since it's been around for a long time.
>>
>>54068323
Why can't you just upload the video so I can test it myself easily? Or even just post an article mentioning exploits for current versions of mpv.
>>
>>54068348
I couldn't find anything mentioning these exploits.
>>
>>54068389
then you can't expect me to believe it.

There was an exploit for ffmpeg, which is what mpv and practically every player uses. Nothing mentions the actual player containing exploits.
>>
>>54068324
>So it still requires that the browser is compromised

Yes, and it likely is. It's insanely naive to think otherwise.

And quantum is kind of relevant see:

https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html

Just in the case linked above the FBI had control of the server so there was no need for the NSA to use qantum to insert the exploit.
>>
>>54068272
Holy shit nigga do you even read?

>Investigating Officer Jesse Smith managed to acquire the laptop of Bradley, which was still running Freenet on the university Wifi network at the time
>>
>>54065517
Kek is that a screenshot of 12chan on the cops screen?
Any fags still remember 12ch?
>>
File: Capture.png (18 KB, 1031x241) Image search: [Google]
Capture.png
18 KB, 1031x241
>>54068348
>>54068439
vlc
>>
File: Capture.png (40 KB, 1034x625) Image search: [Google]
Capture.png
40 KB, 1034x625
>>54068439
>>54068348
mpv (lua)
It runs fine on mpv when lua isn't compiled in.
>>
>>54068725
was that like here? did they post anime pics?
>>
>>54065517

>the sound of so many hard drives of pizza being securely wiped
>>
>>54067906
>doesn't know what a zero day is
>is running pax

wtf.
>>
>>54068862
>A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack.
This "definition" is kinda shit desu. Vendors don't actually have to "hurry to fix it," and in some cases they don't even fucking bother to fix it.
>>
>>54068823
Yeah just like 4chan
>>
>>54065517
I can't imagine that there are people who still don't assume that everything they ever say or do will be scrutinized by the government.
>>
>>54068888
Where did you even get that definition from?

These days I guess it means exploitable vulnerability that isn't known to the general public.

Anything to do with the original meaning of 0 days since release is long gone.
>>
>>54068990
>>54067936
>>
File: tmp_7727-hqdefault-1766048650.jpg (18 KB, 480x360) Image search: [Google]
tmp_7727-hqdefault-1766048650.jpg
18 KB, 480x360
>>54068888
Nice quads.
Checked
>>
>>54067576
Yes, let's go.
>>
>>54068909
who's going to parse all this shit out?

who even cares? I don't think I'm that important. and you shouldn't either. because we're not.
>>
>>54065517

Not possible. Open source is 100% secure.
>>
>>54065517
The guy in the article says he thinks that a tor browser/firefox exploit is the most likely attack vector, he doesn't say that they know this for sure. Considering the feds had the control of the server, they could have just infected some videos or archives and the people they nailed just happened to be the people who downloaded the infected files. Until the they release exactly how the exposed the users real IPs or identities we know nothing for sure.
>>
>>54067680
>NoScript, Video DownloadHelper, Firebug, Greasemonkey, and FlashGot Mass Down
So basically all the things that make firefox good
>>
File: this guy works for the nsa.png (250 KB, 523x372) Image search: [Google]
this guy works for the nsa.png
250 KB, 523x372
>>54067794
was probably made by this guy
>>
File: logo-tao.png (69 KB, 202x205) Image search: [Google]
logo-tao.png
69 KB, 202x205
>>54067720
>Your data is our data, your equipment is our equipment - anytime, any place, by any legal means.

nice
>>
>>54069077
nice dubs
>>
>>54067680
>First, someone must go through the trouble of installing the trojanized extension.
literally

NOTHING
O
T
H
I
N
G
>>
>>54067307
Soopuhr Seekrit Klubhaus.
>>
>>54065517
I'm using firejail, so i should be safe.
>>
>https everywhere
am I safe?
>>
>>54067971
damn
>>
>>54067720
this is fucking insane
one of their mitm attacks involves trying to beat the legitimate packets to the destination before they arrive
>>
>>54072392

Did you like the part where they use and abuse yahoo cookies as a selector? They'll actually have your computer go out and ask yahoo for a cookie to tag you.
Thread replies: 64
Thread images: 9

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.