Latest in Carnegiemellon

Image credit:

Carnegie Mellon says it didn't help the FBI hack Tor for money

19 Shares
Share
Tweet
Share
Save

The Tor network volunteers recently accused Carnegie Mellon University of helping feds uncover the identities of some shady website operators and users, including drug distributors and child pornographers, in exchange for $1 million. In a statement released today, however, the university doesn't only deny getting money from the FBI, but also heavily implies that it was served with a subpoena that requested the details of its Tor research. "The university abides by the rule of law," it said, "complies with lawfully issued subpoenas and receives no funding for its compliance."

When the Tor team went public with its accusation, it revealed that Carnegie Mellon was supposed to present an exploit that can de-anonymize Tor clients en masse during a Blackhat conference. However, the university withdrew its submission and suddenly canceled the presentation. "Apparently these researchers were paid by the FBI to attack hidden services users in a broad sweep," the announcement claimed, "and then sift through their data to find people whom they could accuse of crimes." On the same day that statement went out, Motherboard also reported finding a court document, which said a "university-based research institute" helped identify the case's defendant. Whatever the truth is, that security hole can't be exploited anymore, as Tor already patched it up after detecting the attack that de-anonymized its users.

Here is the university's full statement:

There have been a number of inaccurate media reports in recent days regarding Carnegie Mellon University's Software Engineering Institute work in cybersecurity.

Carnegie Mellon University includes the Software Engineering Institute, which is a federally funded research and development center (FFRDC) established specifically to focus on software-related security and engineering issues. One of the missions of the SEI's CERT division is to research and identify vulnerabilities in software and computing networks so that they may be corrected.

In the course of its work, the university from time to time is served with subpoenas requesting information about research it has performed. The university abides by the rule of law, complies with lawfully issued subpoenas and receives no funding for its compliance.

[Image credit: Bloomberg via Getty Images]

From around the web