<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Operation_Onymous</id>
	<title>Operation Onymous - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Operation_Onymous"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Operation_Onymous&amp;action=history"/>
	<updated>2026-05-15T09:41:32Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Operation_Onymous&amp;diff=2577&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''Operation Onymous''' was an international law enforcement operation targeting darknet markets and other hidden services operating on the Tor network.  == Ra...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Operation_Onymous&amp;diff=2577&amp;oldid=prev"/>
		<updated>2019-03-26T04:24:34Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Operation Onymous&amp;#039;&amp;#039;&amp;#039; was an international law enforcement operation targeting &lt;a href=&quot;/Darknet_market&quot; title=&quot;Darknet market&quot;&gt;darknet markets&lt;/a&gt; and other &lt;a href=&quot;/index.php?title=Hidden_service&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Hidden service (page does not exist)&quot;&gt;hidden services&lt;/a&gt; operating on the &lt;a href=&quot;/Tor&quot; title=&quot;Tor&quot;&gt;Tor network&lt;/a&gt;.  == Ra...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''Operation Onymous''' was an international law enforcement operation targeting [[darknet market]]s and other [[hidden service]]s operating on the [[Tor|Tor network]].&lt;br /&gt;
&lt;br /&gt;
== Raids ==&lt;br /&gt;
On 5 and 6 November 2014, a number of websites, initially claimed to be over 400, were shut down including drug markets such as [[Silk Road (marketplace)|Silk Road 2.0]], Cloud 9 and Hydra. Other sites targeted included [[money laundering]] sites and &amp;quot;[[contraband]] sites&amp;quot;. The operation involved the police forces of 17 countries. In total there were 17 arrests. Defcon was &amp;quot;one of the primary targets&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
$1 million in [[Bitcoin]] was seized, along with [[€]]180,000 in cash, gold, silver and drugs.&lt;br /&gt;
&lt;br /&gt;
US and European agencies sought to publicise the claimed success of their six-month-long operation, which &amp;quot;went flawlessly&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Other leading drug markets in the [[Dark Web|Deep Web]] were unaffected, such as [[Agora (online marketplace)|Agora]], [[Evolution (online marketplace)|Evolution]] and Andromeda. Whereas Silk Road did not in fact distribute weapons, or offer [[contract killing]]s, Evolution did allow trade of weapons as well as drugs. Prior to the closure of Silk Road 2.0, Agora already carried more listings than Silk Road, and Evolution was also expected to overtake it. Agora and Evolution are more professional operations than Silk Road, with more advanced security; the arrest of the alleged Silk Road manager is thought to have been largely due to a series of careless mistakes.&lt;br /&gt;
&lt;br /&gt;
The figure of 414 dark net sites, which was widely reported internationally, and appeared in many news headlines, was later adjusted without explanation to &amp;quot;upward of 50&amp;quot; sites. The true figure is thought to be nearer to 27 sites, to which all 414 [[.onion]] addresses direct. Australian journalist [[Nik Cubrilovic]] claimed to have discovered 276 seized sites, based on a crawl of all onion sites, of which 153 were scam, clone or phishing sites.&lt;br /&gt;
&lt;br /&gt;
== Tor exploit ==&lt;br /&gt;
The number of sites that police initially claimed to have infiltrated led to speculation that a weakness in the Tor network had been exploited. This possibility was downplayed by Andrew Lewman, a representative of the not-for-profit Tor project, suggesting that execution of traditional police work such as following [[Bitcoin]]s was more likely. Lewman suggested that such claims were &amp;quot;overblown&amp;quot; and that the authorities wanted to simply give the impression they had &amp;quot;cracked&amp;quot; Tor to deter others from using it for criminal purposes.&lt;br /&gt;
&lt;br /&gt;
It has been speculated that hidden services could have been deanonymized if law enforcement replicated the research by [[CERT Coordination Center|CERT]] at [[Carnegie Mellon University]] up until the July 30th patch to mitigate the issue. If sufficient relay nodes were [[DDOS]]ed, an attacker could perform traffic confirmation attacks in conjunction with a [[Sybil attack]], by forcing traffic to route over law enforcement controlled nodes, a theory partially supported by logs released by the administrator of [[Doxbin]]. Court documents released in November 2015 generated serious research ethics concerns in the Tor and security research communities about the warrantless exploit (which presumably had been active from February 2014 to July 4, 2015). The Tor Project patched the vulnerability and the FBI denied having paid Carnegie Mellon $1 million to exploit it. Carnegie Mellon also denied receiving money.&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Anonymity networks]]&lt;br /&gt;
==See Also on BitcoinWiki==&lt;br /&gt;
* [[Resto Loyalty Platform]]&lt;br /&gt;
* [[Roin]]&lt;br /&gt;
* [[Alcedo]]&lt;br /&gt;
* [[Tokenlab]]&lt;br /&gt;
* [[MingoCoin]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>