Hackers steal Bitcoin through large-scale exploit on Tor [ TOR & Dark Web ]

in Project HOPE9 months ago

Introduction To Tor

A very Horrible thing i got to know and thought should share will all Crypto Holders here.

torbitcoinhackersgID_2.jpg
refference

Tor Popular For Darkweb And Illegal things

Tor browser is mostly used by hackers because of its ip switching extension inside the browser making it anonymous browser.

dark_web_dark_net_warning_sign_alert_caution_danger_by_thomasbethge_gettyimages1151411167_black_and_yellow_warning_stripes_background_by_croc80_gettyimages483040586_2400x1600100800632large.jpg
refference

Tor is also very popular when it comes to the Another World ( Dark Web ) where people place videos by torturing any gender, whether its male female ( you would have heard the thing ) almost every illegal inhumane things are done their also the viewers bet on the things to do, challenging each other to the worst things ever watched or hear.

The dark web is a part of the internet that isn't indexed by search engines. You've no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. Researchers Daniel Moore and Thomas Rid of King's College in London classified the contents of 2,723 live dark web sites over a five-week period in 2015 and found that 57% host illicit material.
refference

Now coming to the point where hackers used tor to attack , Tor is basically using Relays And after switching out different relays it comes exit relay which got exploit for hackers.

They have operated about 30-40 % exit relays which helped them to do changes in redirection of Bitcoin transactions.

redirection is like i tried exchanging while exchanging was on process they can change the site url or address to their own through which all the money goes to their wallet and we all know once it goes to someone's wallet we cannot do anything about it.

Tweet Explaining all

IMG_20200814_024610.jpg
tweet Link

Hackers used Exit relays And then with these relays they Decrypt all the encryption Protocols which Carry's the security of webpage and can easily access and manipulate all the data inside the page, With this They easily Switch the receiving address to their own.

The vulnerabilities come as a shock to those for whom Tor is the gold standard of anonymity for a web browser. Tor is the interface many use to access the dark web, the underbelly of the Internet that houses drug marketplaces and other illegal activity. The browser is also used by whistleblowers and journalists trying to evade surveillance.
refference

You can get more information by clicking on Refferences as it will redirect ( dont be scared for the redirection after my explanation above lol ) to the Site where everything is explained if you didn't understand my words because of my bad english lol .

btw if you have any query and know something more about it kindly leave the comment so i could learn more about it and also for future i could seek more information . Waiting for your comments :)

-------------------------------------

Moreover I invite you to visit Project.hope and learn about the benefits of this project for all those interested in growing while helping others to grow. they are helping out many underrated posts which could have get trending . Also their moderators are very popular :)

Moreover i would like to say Thanks to the owner of Project Hope @crypto.piotr for the most initiating and making this beautiful community .

So what are the things You need to promise by yourself is

  • I will be active in this community
  • I will not be doing any piagrized activity
  • I will engage others by watching their hardwork so they could feel as i feel today
  • i Will try to contribute best of the content for this community
  • I own this community together we reach to the goal .

so which topics you can right on are Blockchain technology, AI, cybersecurity, robotics, VR, economy, business, marketing, psychology ect.

---------------------------------

As i have given proper reference i can say this :)

23KQwnti57stuXpnvnU2ByoTTe7rtyo8v5uYk1kPymfyjguJmftL7537irKxpbuR26ouaPrQ4rWeWMKnfHfspPjz1an9iLe.png

In love with Project Hope

❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️

Beneficiary set 25%😍
Screenshot_20200701222313.jpg

PB8ro82ZpZP35bVGjGoE93K3E4U5KX8KtMBJ2rgaVXjAfWnRkpCFRraL5GbHyvs8yqAXomr9pjZe1g5j4EdctSmcHJXJntzhfrQkum1s6JhqZ8fG.png

❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️

Sort:  

So the question is not as anonymous as people would like.

Agreed not so anonymous from Anonymous Hackers lol