this post was submitted on 26 Feb 2024
64 points (100.0% liked)

Privacy

31998 readers
939 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] bartolomeo@suppo.fi 5 points 8 months ago (2 children)

states the LockBit .onion site, now controlled by British officials.

How does one hijack a .onion site?

[–] catalog3115@lemmy.world 10 points 8 months ago (1 children)

You don't hijack a .onion site. You pwn the server which hosts .onion site. Give you full access to site. You hijack .onion because its very secure

[–] bartolomeo@suppo.fi 2 points 8 months ago (3 children)

I see. How do you trace a .onion site back to it's server?

[–] pineapplelover@lemm.ee 3 points 8 months ago (1 children)
[–] bartolomeo@suppo.fi 1 points 8 months ago (1 children)

Can you elaborate? Is the server address stored in some open source?

[–] pineapplelover@lemm.ee 2 points 8 months ago (1 children)

Nah nothing like that. I mean that they're sharing info to friends willy nilly and some cops got wind of it. That's kinda what happens to some of the dark web guys who get caught. It's very rarely something very technical it's just their own idiocy for reusing emails, transferring funds incorrectly making it traceable, Delivering sus packages all at once to usps

[–] bartolomeo@suppo.fi 1 points 8 months ago
[–] catnip@lemmy.zip 2 points 8 months ago

By pwning it. You dont have to find it to pwn it. You just have to be able to send data to it, which everyone can do because whats the point of having a server if noone can interact with it. The attacker just interacts with it in a way that manipulates it to execution attacker controlled code. So for a .onion website for example you find a vulnerability in the websites code and exploit it to make the server the website is running on do what you want.

[–] catalog3115@lemmy.world 2 points 8 months ago

In simple terms you can't trace back the server useless the webadmin did some stupidity or vulnerability

[–] BaumGeist@lemmy.ml 2 points 8 months ago

Outside of controlling and rewriting the protocol: steal the keys used to generate the route or take over control of the server that hosts it