	{"id":16651,"date":"2013-08-06T12:17:11","date_gmt":"2013-08-06T19:17:11","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=16651"},"modified":"2017-06-30T11:56:21","modified_gmt":"2017-06-30T18:56:21","slug":"torsploit-ip-address-is-owned-by-government-contractor","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/","title":{"rendered":"Torsploit IP Address Is Owned By Government Contractor?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Torsploit.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-16655\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Torsploit.jpg\" alt=\"Torsploit\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Torsploit.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Torsploit-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Torsploit-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>So apparently this is the week I get to harp on the necessity of reading news with a soup\u00e7on of skepticism. Are you ready for a little dissection of some hyperbolic claims of certainty that the Feds were behind the Tor exploit? Because here it comes!<\/p>\n<p>Yesterday, I said that we might <a href=\"https:\/\/www.intego.com\/mac-security-blog\/tor-anonymity-attacked-feds-suspected\/\" target=\"_blank\">never know for certain<\/a> who was behind the attack on Tor. Partly I say this because we\u2019re basing guesses right now on where data is being sent, not where the code originated. That\u2019s mostly because that\u2019s all the info we have right now. But the other part of it is that we can\u2019t say for certain that the data is entirely trustworthy. If it\u2019s sending to a government address, is that to create fear and throw blame on the government? If we found out it did in fact originate from a machine owned by the NSA, can we be certain that the machine wasn\u2019t compromised? Most of these questions can\u2019t (or likely won\u2019t) conclusively be answered.<\/p>\n<p>As it turns out, we also <a href=\"http:\/\/blog.dynamoo.com\/2013\/08\/torsploit-is-6522220253-nsa.html\">can\u2019t be so sure<\/a> that a government contractor does in fact own the IP where the data is going. Some popular tools will over-simplify data, and if we don\u2019t double-check it, we could get some potentially misleading (if very sensational) data. Yes \u2013 it could still be a government contractor, but it could also be a pwned corporate machine, for instance.<\/p>\n<p>I don\u2019t know exactly how or where one should draw the line in terms of believing sensational news (the NSA revelations certainly <a href=\"https:\/\/www.intego.com\/mac-security-blog\/top-5-ineffective-ways-to-protect-yourself-from-government-surveillance\/\">threw me for a loop<\/a>!) and I imaging this line will differ from one person to the next. But it\u2019s a good idea to remember that the information we get in the early stages of an event are often more sensational than accurate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So apparently this is the week I get to harp on the necessity of reading news with a soup\u00e7on of skepticism. Are you ready for a little dissection of some hyperbolic claims of certainty that the Feds were behind the Tor exploit? Because here it comes! Yesterday, I said that we might never know for [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":16657,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[52,289,569,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"So apparently this is the week I get to harp on the necessity of reading news with a soup\u00e7on of skepticism. Are you ready for a little dissection of some\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Torsploit IP Address Is Owned By Government Contractor? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"So apparently this is the week I get to harp on the necessity of reading news with a soup\u00e7on of skepticism. Are you ready for a little dissection of some\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-06T19:17:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-06-30T18:56:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"266\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg\",\"width\":400,\"height\":266},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/\",\"name\":\"Torsploit IP Address Is Owned By Government Contractor? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#primaryimage\"},\"datePublished\":\"2013-08-06T19:17:11+00:00\",\"dateModified\":\"2017-06-30T18:56:21+00:00\",\"description\":\"So apparently this is the week I get to harp on the necessity of reading news with a soup\\u00e7on of skepticism. Are you ready for a little dissection of some\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Torsploit IP Address Is Owned By Government Contractor?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Torsploit IP Address Is Owned By Government Contractor?\",\"datePublished\":\"2013-08-06T19:17:11+00:00\",\"dateModified\":\"2017-06-30T18:56:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#webpage\"},\"wordCount\":320,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg\",\"keywords\":[\"Exploit\",\"Government\",\"Tor\",\"Torsploit\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"So apparently this is the week I get to harp on the necessity of reading news with a soup\u00e7on of skepticism. Are you ready for a little dissection of some","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/","og_locale":"en_US","og_type":"article","og_title":"Torsploit IP Address Is Owned By Government Contractor? - The Mac Security Blog","og_description":"So apparently this is the week I get to harp on the necessity of reading news with a soup\u00e7on of skepticism. Are you ready for a little dissection of some","og_url":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-08-06T19:17:11+00:00","article_modified_time":"2017-06-30T18:56:21+00:00","og_image":[{"width":400,"height":266,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg","width":400,"height":266},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/","name":"Torsploit IP Address Is Owned By Government Contractor? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#primaryimage"},"datePublished":"2013-08-06T19:17:11+00:00","dateModified":"2017-06-30T18:56:21+00:00","description":"So apparently this is the week I get to harp on the necessity of reading news with a soup\u00e7on of skepticism. Are you ready for a little dissection of some","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Torsploit IP Address Is Owned By Government Contractor?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Torsploit IP Address Is Owned By Government Contractor?","datePublished":"2013-08-06T19:17:11+00:00","dateModified":"2017-06-30T18:56:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#webpage"},"wordCount":320,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg","keywords":["Exploit","Government","Tor","Torsploit"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/torsploit-ip-address-is-owned-by-government-contractor\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/TorsploitFT.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4kz","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16651"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=16651"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16651\/revisions"}],"predecessor-version":[{"id":67843,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16651\/revisions\/67843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/16657"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=16651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=16651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=16651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}