"The Tor Project has learned more about last year's attack by Carnegie Mellon researchers on the hidden service subsystem," begins the post. "Apparently these researchers were paid by the FBI to attack hidden services users in a broad sweep, and then sift through their data to find people whom they could accuse of crimes."As reported by Ars Technica, a Homeland Security search warrant affidavit reveals that between January and July of last year, federal law enforcement officials received a "source of information" that gave them "particular IP addresses" of Tor users who had accessed Silk Road 2.0. By July, Tor had successfully shut down the attack, an assault which to them resembled a technique devised by Carnegie Mellon researchers who decided to cancel their presentation at Black Hat USA 2014 on their findings.
“On October 12, 2015, the government provided defense counsel a letter indicating that Mr. Farrell's involvement with Silk Road 2.0 was identified based on information obtained by a 'university-based research institute' that operated its own computers on the anonymous network used by Silk Road 2.0,” the motion reads, as reported by Motherboard.This piece of information has all but confirmed to Tor the involvement of Carnegie Mellon. When staff persons at the Tor Project contacted Carnegie Mellon for comment on its findings, the university cited a lack of evidence.
“I’d like to see the substantiation for their claim,” said Ed Desautels, a staffer in the public relations department of the university’s Software Engineering Institute. “I’m not aware of any payment.”According to WIRED, Tor had indeed identified Carnegie Mellon as the source of the attack by pinpointing servers running on its network. When it questioned the university about this activity, the servers disappeared, and Carnegie Mellon did not offer any comment. At this time, the FBI has declined to comment on Tor's findings.