



Use it to boot from USB your favorite Live Linux portable Operating Systems, Linux and Windows Installers, antivirus utilities, disc cloning, backup, penetration testing, diagnostic tools, and much more. This tool can quickly create a Multiboot bootable USB flash drive containing several different ISO files. I'd imagine that if you're that big of a target Tor vulnerabilities aren't even what's most likely to get you caught, it's other opsec mistakes that'll get you busted like in the case of the original Silk Road and countless similar cases.YUMI (Your USB Multiboot Installer) is a Multiboot USB Boot Creator that can be used to make a Multisystem flash drive. A big part of remaining secure is to not draw unwanted attention to yourself whenever possible. Regular people seeking privacy are not the government's top priority. If you're selling millions of dollars worth of drugs or distributing CP I suggest you stop doing that as if they do have a currently working exploit you will certainly be among their first targets. There is a reason China, Russia, and Iran try their best to block all mentions of it. Tor is pretty good (even if not bulletproof). Does the FBI/CIA currently have knowledge of a critical Tor exploit that allows them to de-anonymize users? Possibly, but comparing their actions right now to how they've handled having exploits in the past it seems less likely (but still possible). This specifically was patched in July of 2014 (over 8 years ago).Įxploits exist and will exist in every piece of software, even critical stuff like Tor. Nation state hackers can set up these repositories without fear of Leo's unless isps or users blacklist/block these poison wells.Ĭases involve hard drug sales on Silk Road If you're using one of these poisoned browsers it seems rather trivial to have entire libraries set up with malware as OS so the perpetrators will monitor your actions online to launch mim attacks where your downloaded/downloading or cached files will be their garbage instead of your desired clean files. I've found multiple entire poisoned Linux distributions over time, often sent through highjacked tcp/ip sessions when the victim would be downloading the iso.

After I saw what it was doing I allowed the compromised machine to act as a honeypot for a long time before taking it offline to do in depth forensics. It allowed operators of the nodes access to the device hosting the browser. it, the poisoned browser had a ghost proxy which ran your connection through nodes in Korea. These poison tor browsers show up often I downloaded one accidentally from a non tor project repository in 2017, it was actually listed appearing as a legitimate repository for an extended period.
