Forgot your password?
typodupeerror

Submission Summary: 0 pending, 24 declined, 4 accepted (28 total, 14.29% accepted)

Sony

+ - DC Universe Online Goes F2P->

Submitted by
mlauzon
mlauzon writes "Seems a lot of companies are seeing the light and turning their subscription based games into the F2P model, or freemium as it's now being called:

For those of us who lack Batman's financial resources, maintaining several monthly MMO subscriptions can be a challenge. Sony Online Entertainment recognizes this, and as a result, the company has just announced that DC Universe Online will be officially joining the freemium revolution toward the end of October.
 "

Link to Original Source

+ - LulzSec members revealed by "LulzSec Exposed"?->

Submitted by
mlauzon
mlauzon writes "The antics by LulzSec over the past few weeks may have attracted a bit too much attention, at least for those involved in the group. Their veil of anonymity and fearlessness may be finally crumbling. Some unidentified individuals are taking matters into their own hands, feeding LulzSec a taste of their own medicine — revealing the identities of (suspected) LulzSec members to the world.

A new blog, LulzSec Exposed, began its first day on Blogspot with a mountain of IRC chat logs and personal information for a handful of LulzSec members: Kayla, BarretBrown, Joepie, Nakomis, and Topiary. Of these persons, Topiary admitted to being part of LulzSec via their official Twitter page. Three of these persons are from the United States, while one is from Sweden and one from the Netherlands. Mr. Brown has also contributed to various publications, including the Huffington Post and The Guardian.

Amongst the blog posts, there is also evidence that suggests some of the LulzSec members used to be part of Anonymous, based on similar IRC nicknames they use.

LulzSec has, not surprisingly, mocked the accuracy of the posted information. Despite that, the confident public face they put on while revealing their exploits on their site and in explaining their antics may be one giant facade, as members are being extra cautious thanks to the extra scrutiny they now face from the general public and authorities alike."

Link to Original Source
Youtube

+ - Arnold Schwarzenegger's "The Governator" trailer->

Submitted by
mlauzon
mlauzon writes "EW.com is reporting about a team up between Stan Lee & Arnold Schwarzenegger in a new cartoon to premier next year:

This week’s EW cover story is an exclusive interview with Arnold Schwarzenegger talking about his plan to return to movies and unleash an animated superhero TV series: The Governator. Below is a full three-minute trailer from the project, which teams Ah-nold with comic legend Stan Lee:

http://www.youtube.com/watch?v=Fw6J9OGSXpg"

Link to Original Source
Google

+ - Google Introduces Gmail Motion->

Submitted by
mlauzon
mlauzon writes "Google is launching a new way to interact with their web based mail app called Motion, it's very innovative and will free you from the constraints of the mouse & keyboard. From the info page:

The mouse and keyboard were invented before the Internet even existed. Since then, countless technological advancements have allowed for much more efficient human computer interaction. Why then do we continue to use outdated technology? Introducing Gmail Motion — now you can control Gmail with your body."

Link to Original Source

+ - The Pirate Bay Acquires eBay-> 1

Submitted by
mlauzon
mlauzon writes "TorrentFreak is reporting that The Pirate Bay has purchased eBay. From the article:

Here’s an announcement we don’t read every day. As of today The Pirate Bay is the proud owner of eBay. The torrent site plans to use eBay technology to code a better rating system for torrents. How much was paid for the auction site is still a mystery.

TorrentFreak talked to one of The Pirate Bay crew members who told us that they had to find a legitimate investment for the billions of dollars they’ve made from annoying pop-under ads, and this appeared to be a decent option."

Link to Original Source
Media

+ - King of Pop Michael Jackson is dead: official ->

Submitted by
mlauzon
mlauzon writes "LOS ANGELES (Reuters) — Michael Jackson, the child star turned King of Pop who set the world dancing but whose musical genius was overshadowed by a bizarre lifestyle and sex scandals, died on Thursday. He was 50.

Jackson was pronounced dead after arriving at a Los Angeles hospital in full cardiac arrest, Los Angeles coroner Fred Corral said. The cause of death was not known and an autopsy would likely take place on Friday, he said.

Jackson's sudden death had been reported earlier by U.S. media including the Los Angeles Times and the TMZ entertainment website, which said he was taken ill at his home and rushed to the hospital by paramedics who found him not breathing when they arrived.

Known as the "King of Pop," for hits that included "Thriller" and "Billie Jean," Jackson's dramatic, one-gloved stage presence and innovative dance moves were imitated by legions of fans around the world.

His lifetime record sales tally is believed to be around 750 million, which, added to the 13 Grammy Awards he received, made him one of the most successful entertainers of all time.

But Jackson's belief that "I am Peter Pan in my heart", his preference for the company of children, his friendship with a chimp, his high-pitched voice and numerous plastic surgeries also earned him critics and the nickname "Wacko Jacko."

Jackson, who had lived as a virtual recluse since his acquittal in 2005 on charges of child molestation, had been scheduled to launch a comeback tour from London next month.

Quincy Jones, who helped arrange the music on the album "Thriller" and produced the "Off the Wall" album, told MSNBC: "I am absolutely devastated at this tragic and unexpected news."

"For Michael to be taken away from us so suddenly at such a young age, I just don't have the words. I've lost my little brother today, and part of my soul has gone with him."

PARAMEDICS UNABLE TO REVIVE SINGER

TMZ said on its website that Jackson suffered a cardiac arrest on Thursday afternoon at his Holmby Hills home and paramedics were unable to revive him. "We're told when paramedics arrived Jackson had no pulse and they never got a pulse back," the site said.

The Los Angeles Times said paramedics performed cardiopulmonary resuscitation at the singer's home before taking him to the UCLA Medical Center hospital.

Jackson had been due to start a series of concerts in London on July 13 running until March 2010. The singer had been rehearsing in the Los Angeles area for the past two months.

The shows for the 50 London concerts sold out within minutes of going on sale in March.

There were concerns about Jackson's health in recent years but the promoters of the London shows, AEG Live, said in March that Jackson had passed a 4-1/2 hour physical examination with independent doctors.

Outside the hospital in Los Angeles about 200 fans and reporters gathered on Thursday, waiting for confirmation of Jackson's death or condition.

Some fans were crying and hugging each other, and others were climbing atop fences to get a better look at a microphone stand where a news conference was supposed to take place.

"I hope he's gone to God, and I hope that he's free of all the troubles he's been plagued with," Tonya Blazer, 50, who said she had been a fan going back more than four decades to his days as a child star.

"I just feel like I'm paying tribute to him," said Dawn Burgess, 42, a fan who said she had posters of Michael pinned to her bedroom wall when she was a child.

CHILD STAR TO MEGASTAR

Jackson was born on August 29, 1958, in Gary, Indiana, the seventh of nine children. Five Jackson boys — Jackie, Tito, Jermaine, Marlon and Michael — first performed together at a talent show when Michael was 6. They walked off with first prize and went on to become a best-selling band, The Jackson Five, and then The Jackson 5.

Jackson made his first solo album in 1972, and released "Thriller" in 1982, which became a smash hit that yielded seven top-10 singles. The album sold 21 million copies in the United States and at least 27 million worldwide.

The next year, he unveiled his signature "moonwalk" dance move while performing "Billie Jean" during an NBC special.

In 1994, Jackson married Elvis Presley's only child, Lisa Marie, but the marriage ended in divorce in 1996. Jackson married Debbie Rowe the same year and had two children, before splitting in 1999. The couple never lived together.

Jackson has three children named Prince Michael I, Paris Michael and Prince Michael II, known for his brief public appearance when his father held him over the railing of a hotel balcony, causing widespread criticism.

New Yorkers and tourists in the city's Times Square were shocked at the news of Jackson's death.

"I don't know what to say. It's sad, it's really, really sad," said Nicole Smith, an 18-year-old student from Brooklyn, New York, in Times Square. "My mother was a fan. I listened to his music."

"I'm shocked. I thought someone was lying to me when I first heard it. I was a fan from when he was a little boy and then he got weird," said Sue Sheider, 51, a teacher from Long Island."

Link to Original Source
Windows

+ - Panda Offering Free, Cloud-Based AV

Submitted by
mlauzon
mlauzon writes "After nearly three years of development, Panda Security today released the public beta of its Panda Cloud Antivirus, which the company claims is the first free cloud-based antivirus thin-client. By taking AV duties to the cloud and combining it with local detection technologies, Panda says it can do a better job at protecting your PC than a traditional virus scanner. "Thanks to Panda Security's Collective Intelligence malware and goodware online database, Panda Cloud Antivirus detects more malware than traditional signature-based solutions which take longer to detect the most recent, and therefore most dangerous, variants," Pedro Bustamanta, Panda Senior Research Advisor, wrote in a blog entry. The local portion of the program takes up roughly 50MB of hard drive space while consuming about 17MB of RAM, according to a Cnet report. By the time Panda Cloud Antivirus exits the beta stage, Bustamante hopes to have the RAM consumption down to 12MB. One potential downside to relying on the cloud for antivirus protection is that your PC would be left vulnerable without an internet connection. But not to worry, says Bustamante, who clarified that a local cache copy of Collective Intelligence is kept on the PC for just such scenarios. http://www.cloudantivirus.com/"
PC Games (Games)

+ - Duke Nukem Forever Reaches Development Milestone 1

Submitted by
mlauzon
mlauzon writes "If you told your spouse that the two of you would be together until Duke Nukem Forever hit shelves in an attempt to be absolutely precious, it might be time to start sweating. According to a tweet by 3D Realms man George Broussard, Duke Nukem Forever's unending development cycle may soon be leaving the death-and-taxes consistency club.

"Closing out a milestone this week. 71 more tasks to do and we started with probably 800-900. Been a good push. Next one starts Monday," he tweeted.

After some rudimentary math, we've determined that — assuming development continues at a nice clip — Duke will be back in business sometime next year. Guess the Mayans were a little off with their apocalypse calculations.

Maximum PC"
Microsoft

+ - Happy Birthday Windows->

Submitted by
mlauzon
mlauzon writes "Windows 1.0, the original 16-bit operating system, was released on 20 November 1985 and today marks its 23rd Birthday. 55 programmers developed the system in a year, making the 1st edition a break from the norm in terms of usability. It enabled users to use a mouse to navigate the system and use its various functions and applications that were included. Applications included were a set of desktop applications (MS-DOS File Management Program), a calendar, card file, notepad, calculator, clock and telecommunications programs allowing users to manage their day-to-day activites much like a PDA does today. It also allowed users to switch between programs without needing to quit and restart them. The OS itself had 256 colours ability, re sizable windows, a reserved area of minimized programs (the original concept of the task bar) and the ability to customize the appearance of windows. Microsoft began to include what we now call a "Control Panel" in its first version of Windows (1.x). It came with a lot of interface controls that are still seen in versions of Windows today such as text boxes, radio buttons, scrolling bars and menu items. In the interface of Windows 1.0, windows can be maximized, minimized or tiled. The active windows cannot be overlapped instead of tiled. There is no option to cascade windows, so it is inconvenient to show more windows at the same time. Microsoft announced the idea of windows in spring 1983. But the first version of Windows, Windows 1.0 was not released until November 1985. Windows 1.x is based on MS-DOS 2.0. Due to the hardware and software limitations of MS-DOS 2.0, it was not successful compared to later versions of Windows such as Windows 3.1. However, Microsoft did have a good chance to market the operating system at fast developing IBM compatible computers. Speaking of marketing, Microsoft's screaming CEO, Steve Ballmer, got behind a camera and recorded a hilarious advert for Windows 1.0. Shouting on the video, Ballmer gets excited about Windows Write, Windows Paint, Notepad and a clock feature! Thankfully even Paint has been updated these days with the introduction of the ribbon user interface in Windows 7. Checkout Ballmer's advert below. Also worthy of a special mention is Rafael Rivera, the author of Within Windows. Rafael is famous for creating UX theme patches for Vista and XP and recently unlocked the superbar in Windows 7. Rafael was born on the exact same day as Windows 1.0 was released. Happy Birthday Rafael & Windows!


Source: Neowin.net"

Link to Original Source
Announcements

+ - YouTube's HD Plans: Cancelled!->

Submitted by
mlauzon
mlauzon writes "Yesterday we explained why YouTube's HD plans wouldn't amount to much. Time to ratchet those expectations down even more: YouTube doesn't have any HD plans — for now, at least.

Yesterday's post was based on a discussion between YouTube co-founder Steve Chen and NewTeeVee's Om Malik and Liz Gannes, as reported by TechCrunch's Duncan Riley. But Liz tells us that Duncan got it wrong: YouTube's Chen never mentioned "high definition," or HD video, during the interview. Instead, she says, YouTube is merely testing higher quality video.

Gannes:

What I got out of [Chen's] comments was that YouTube's first priority is making sure everyone, everywhere, on any device, could view every video on the site. Steve actually said himself, as the commenters above are saying, that HD really doesn't make sense for the short, silly clips that are YouTube's bread and butter.


YouTube will likely eventually support HD. But it's good to see that Steve Chen is skeptical about its utility in the present tense. For video to play in HD, it must first be shot in HD, edited in HD, and uploaded in HD. And barely anything on YouTube meets those criteria now.

Meanwhile, IAC/Connected Ventures' Jakob Lodwick — whose Vimeo already supports HD video — used yesterday's non-news as an opportunity to rip YouTube's copyright policy. Worth a read."

Link to Original Source
Announcements

+ - High-quality YouTube videos coming soon->

Submitted by
mlauzon
mlauzon writes "YouTube co-founder Steve Chen, speaking at the NewTeeVee Live conference today, confirmed that high-quality YouTube video streams are coming soon. Although YouTube's goal, he said, is to make the site's vast library of content available to everyone, and that requires a fairly low-bitrate stream, the service is testing a player that detects the speed of the viewer's Net connection and serves up higher-quality video if viewers want it.

Why wouldn't they? Because the need to buffer the video before it starts playing will change the experience. Hence the experiment, rather than just a rapid rollout of this technology. On stage, he said the current resolution of YouTube videos has been "good enough" for the site untill now.

Chen told me he expects that high-quality YouTube videos will be available to everyone within three months.

Chen also confirmed that in YouTube's internal archive, all video is stored at the native resolution in which it was sent. However, he said, a large portion of YouTube videos are pretty poor quality to begin with — 320x240. Streaming them in high-quality mode isn't going to help much."

Link to Original Source
Windows

+ - Boost Windows XP with Flash Memory->

Submitted by
mlauzon
mlauzon writes "MDO Ltd. announces the release of eBoostr, a complete replacement for Microsoft ReadyBoost technology for Windows XP.

Upgrade the performance of your PC without upgrading its components. Get ReadyBoost-like technology in Windows XP. Overcome ReadyBoost limitations and use up to four inexpensive flash devices to speed up your system. Add more speed to your PC without upgrading!

If you could improve the performance of your computer by upgrading just one item, that would be memory. Adding more RAM speeds up Windows and applications, allowing the system to access the hard disk less often. This is especially true for older PCs with 256 or 512 MB of RAM, and laptop computers with slow hard drives.

Upgrading computer components can be costly, and is not always possible. Buying and plugging a USB flash memory stick, on the other hand, is neither expensive nor complicated. That is why Microsoft developed a new technology called ReadyBoost. ReadyBoost uses flash memory plugged into a computer to enhance operating system responsiveness, decrease loading time, and improve computer performance.

Unfortunately, Microsoft ReadyBoost is only available in Windows Vista. Since the day Microsoft announced its ReadyBoost technology for Windows Vista, the company made it clear that no ReadyBoost upgrade will be released to support Windows XP and older operating systems.

eBoostr is a third-party implementation of speed-enhancing technology based on using flash memory to enhance the responsiveness and performance of a Windows XP computer. eBoostr works similar to Microsoft ReadyBoost, providing many of the same benefits to the end user.

Improved Performance with No Costly Hardware Upgrades

eBoostr improves the performance of any PC without having to upgrade its components or the operating system. Using flash memory allows Windows XP to access hard drives less frequently, which results in improved performance and responsiveness of Windows XP and all applications.

No ReadyBoost Limitations

ReadyBoost is a great technology, but it has its limitations. Its current incarnation does not support more than one flash memory stick or card at a time. ReadyBoost requires using fast flash memory that can be more expensive than the typical flash drive found on everyone's desk. Finally, ReadyBoost helps the most to those with little amount of RAM installed, and provides slim benefits to PCs with a gigabyte or more of RAM.

eBoostr overcomes these limitations. While it works great with ReadyBoost Certified devices, eBoostr also supports slower, less expensive flash memory sticks and cards, allowing for a really inexpensive way to improve your computer performance. eBoostr is not limited to a single stick or card, and supports up to four flash units simultaneously. Finally, unlike ReadyBoost, eBoostr provides noticeable performance benefits even to PCs that are stuffed with RAM sticks to the max.

Laptop Friendly

Laptop computers benefit from reduced hard drive activities even more than their desktop siblings. Notebook hard drives are slower than desktop disks, and system responsiveness rises to the new level with the use of flash memory and eBoostr. Less hard drive access results in reduced power consumption, which leads to improved battery life. Work faster and longer on your Windows XP laptop with eBoostr!

About MDO

MDO (Moscow Development Office) was founded in 1994 and since then through creative work of its team of developers has gained a stable position in the field of software and internet development, as well as high acclaim from users all over the world for its digital photography product line, FirmTools. Its new product, eBoostrTM, was developed by the company division organized specially for this project. For more information about the company and products, visit http://www.eBoostr.com/."

Link to Original Source
Software

+ - CoFundos.org - Sponsoring Open Source Development->

Submitted by
mlauzon
mlauzon writes "Confundos is a discussion platform for the exchange and development of ideas. It's based on open source and open knowledge — all ideas on the site must be licensed under a Creative Commons license. The site relies on transparency and accountability to foster enriching discussions. Here's a basic rundown of how it functions: someone needs an open source software or plugin; he/she proceeds to describe on the site; from there, the description is enhanced by community input and comments; next, users who need such a project bid for its completion; specialists capable of accomplishing the project pitch their services after which competitive bids are received once the project runs beyond original bid; offers are then accepted and the project is completed.

"Cofundos helps to realize bright ideas, by providing a platform for their discussion & enrichment and by establishing a process for organizing the contributions and interests of different stakeholders in the idea."

"Cofundos helps to realize bright ideas, by providing a platform for their discussion & enrichment and by establishing a process for organizing the contributions and interests of different stakeholders in the idea."

How well will this work out? Are people willing to bid sufficient funds for project development?"

Link to Original Source
Software

+ - Tor: The hack of the year->

Submitted by
mlauzon
mlauzon writes "A Swedish hacker tells how he infiltrated a global communications network used by scores of embassies over the world, using tools freely available on the internet.

In August, Swedish hacker Dan Egerstad gained access to sensitive embassy, NGO and corporate email accounts. Were they captured from the clutches of hackers? Or were they being used by spies? Patrick Gray investigates the most sensational hack of 2007.


IT WASN'T supposed to be this easy. Swedish hacker Dan Egerstad had infiltrated a global communications network carrying the often-sensitive emails of scores of embassies scattered throughout the world. It had taken him just minutes, using tools freely available for download on the internet.

In time, Egerstad gained access to 1000 high-value email accounts. He would later post 100 sets of sensitive email logins and passwords on the internet for criminals, spies or just curious teenagers to use to snoop on inter-governmental, NGO and high-value corporate email.

The question on everybody's lips was: how did he do it? The answer came more than a week later and was somewhat anti-climactic. The 22-year-old Swedish security consultant had merely installed free, open-source software — called Tor — on five computers in data centres around the globe and monitored it. Ironically, Tor is designed to prevent intelligence agencies, corporations and computer hackers from determining the virtual — and physical — location of the people who use it.

"Tor is like having caller ID blocking for your internet address," says Shava Nerad, development director with the Tor Project. "All it does is hide where you're communicating from."

Tor was developed by the US Navy to allow personnel to conceal their locations from websites and online services they would access while overseas. By downloading the simple software, personnel could hide the internet protocol address of their computers — the tell-tale number that allows website operators or intelligence services to determine a user's location.

Eventually the navy realised it must take Tor beyond the armed forces. "The problem is, if you make Tor a tool that's only used by the military . . . by using Tor you're advertising that you're military," Nerad says.

So Tor was cast into the public domain. It is now maintained and distributed by a registered charity as an open-source tool that anyone can freely download and install. Hundreds of thousands of internet users have installed Tor, according to the project's website.

Mostly it is workers who want to browse pornographic websites anonymously. "If you analyse the traffic, it's just porn," Egerstad told Next by phone from Sweden. "It's kind of sad."

However, Dmitri Vitaliev, a Russian-born, Australian-educated computer security professional who lives in Canada, says Tor is a vital tool in the fight for democracy. Vitaliev trains human-rights campaigners on how to stay safe when online in oppressive regimes. "It's incredibly important," he said in a Skype chat from the unrecognised state of Transnistria, a breakaway region in Moldova where he's assisting a local group working to stop the trafficking of women. "Anonymity is a high advantage in countries that perform targeted surveillance on activists."

It's also used to bypass website censorship in more than 20 countries that censor political and human rights sites, he says.

Tor works by connecting its users' internet requests, randomly, to volunteer-run Tor network nodes. Anyone can run a Tor node, which relays the user's traffic through other nodes as encrypted data that can't be intercepted.

When the user's data reaches the edge of the Tor network, after bouncing through several nodes, it pops out the other side as unencrypted, readable data. Egerstad was able to get his mitts on sensitive information by running an exit node and monitoring the traffic that passed through it.

The problem, says Vitaliev, is some Tor users assume their data is protected from end to end. "As in pretty much any other internet technology, its vulnerabilities are not well understood by those who use it (and) need it most," he says.

The discovery that sensitive, government emails were passing through Tor exit nodes as unencrypted, readable data was only mildly surprising to Egerstad. It made sense — because Tor documentation mentions "encryption", many users assume they're safe from all snooping, he says.

"People think they're protected just because they use Tor. Not only do they think it's encrypted, but they also think 'no one can find me'," Egerstad says. "But if you've configured your computer wrong, which probably more than 50 per cent of the people using Tor have, you can still find the person (on) the other side."

Initially it seemed that government, embassy, NGO and corporate staffers were using Tor but had misconfigured their systems, allowing Egerstad to sniff sensitive information off the wire. After Egerstad posted the passwords, blame for the embarrassing breach was initially placed on the owners of the passwords he had intercepted.

However, Egerstad now believes the victims of his experiment may not have been using Tor. It's quite possible he stumbled on an underground intelligence gathering exercise, carried out by parties unknown.

"The whole point of the story that has been forgotten, and I haven't said much about it, (is that) many of these accounts had been compromised," he says. "The logins I caught were not legit users but actual hackers who'd been reading these accounts."

In other words, the people using Tor to access embassy email accounts may not have been embassy staff at all. Egerstad says they were computer hackers using Tor to hide their origins from their victims.

The cloaking nature of Tor is appealing in the extreme to computer hackers of all persuasions — criminal, recreational and government sponsored.

If it weren't for the "last-hop" exit node issue Egerstad exposed in such a spectacular way, parties unknown would still be rifling the inboxes of embassies belonging to dozens of countries. Diplomatic memos, sensitive emails and the itineraries of government staffers were all up for grabs.

After a couple of months sniffing and capturing information, Egerstad was faced with a moral dilemma: what to do with all the intercepted passwords and emails.

If he turned his findings over to the Swedish authorities, his experiment might be used by his country's intelligence services to continue monitoring the compromised accounts. That was a little too close to espionage for his liking.

So Egerstad set about notifying the affected governments. He approached a few, but the only one to respond was Iran. "They wanted to know everything I knew," he says. "That's the only response I got, except a couple of calls from the Swedish security police, but that was pretty much all the response I got from any authority."

Frustrated by the lack of a response, Egerstad's next step caused high anxiety for government staffers — and perhaps intelligence services — across the globe. He posted 100 email log-ins and passwords on his blog, DEranged Security. "I just ended up (saying) 'Screw it, I'm just going to put it online and see what happens'."

The news hit the internet like a tonne of bricks, despite some initial scepticism. The email logins were quickly and officially acknowledged by some countries as genuine, while others were independently verified.

US-based security consultant — and Tor user — Sam Stover says he has mixed feelings about Egerstad's actions. "People all of a sudden (said) 'maybe Tor isn't the silver bullet that we thought it was'," Stover says. "However, I'm not sure I condone the mechanism by which that sort of information had to be exposed in order to do that."

Stover admits that he, too, once set up a Tor exit node. "It's pretty easy . . . I set it up once real quick just to make sure that I could see other people's traffic and, sure enough, you can," he says. "(But) I'm not interested in that sort of intelligence gathering."

While there's no direct evidence, it's possible Egerstad's actions shut down an active intelligence-gathering exercise. Wired.com journalist Kim Zetter blogged the claims of an Indian Express reporter that he was able to access the email account for the Indian ambassador in China and download a transcript of a meeting between the Chinese foreign minister and an Indian official. In addition to hackers using Tor to hide their origins, it's plausible that intelligence services had set up rogue exit nodes to sniff data from the Tor network.

"Domestic, or international . . . if you want to do intelligence gathering, there's definitely data to be had there," says Stover. "(When using Tor) you have no idea if some guy in China is watching all your traffic, or some guy in Germany, or a guy in Illinois. You don't know."

Egerstad is circumspect about the possible subversion of Tor by intelligence agencies. "If you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they're using lots of bandwidth, they're heavy-duty servers and so on," Egerstad says. "Who would pay for this and be anonymous?"

While Stover regards Tor as a useful tool, he says its value is greatly overestimated by those who promote and use it. "I would not use or recommend the tool to hide from people between you and your endpoint. It's really purely a tool to hide from the endpoint," he says.

As a trained security professional, Stover has the nous to understand its limitations, he says. Most people don't.

The lesson remains but the data Egerstad captured is gone, the Swedish hacker insists. He's now focusing on his career as a freelance security consultant. "I deleted everything I had because the information I had was belonging to so many countries that no single person should have this information so I actually deleted it and the hard drives are long gone," he says."

Link to Original Source

One picture is worth 128K words.

Working...