Is the Tor Network Broken?

270

In the recent months it was also discussed about the possibility to track selected users on Tor networks with a technique known as Traffic Correlation Attack defined by the researchers led by Aaron Johnson of the Naval Research Laboratory.

Today I want to report to you that two hackers have announced a technique to de-anonymize Tor users easily, and the two experts Alexander Volynkin and Michael McCord will present the results of their study at the next Black Hat 2014.

Your TOR usage is being watched

In the presentation they have announced, titled “YOU DON’T HAVE TO BE THE NSA TO BREAK TOR: DEANONYMIZING USERS ON A BUDGET“, the experts will show how to identify Tor users with a very small budget, just $3,000.

“There is nothing that prevents you from using your resources to de-anonymize the network’s users instead by exploiting fundamental flaws in Tor design and implementation. And you don’t need the NSA budget to do so. Looking for the IP address of a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. We know because we tested it, in the wild…”  “In this talk, we demonstrate how the distributed nature, combined with newly discovered shortcomings in design and implementation of the Tor network, can be abused to break Tor anonymity,” are the statements used by the two researchers to describe their work.

I confess you to be very excited to see the presentation of the two experts.

If it is possible to track users on Tor network, let’s imagine the capabilities of a persistent attacker with much more computational capability and with a “couple gigabit links”.

Read >>
TOR Cannot Protect You From Targeted Surveillance

According to the two experts a persistent adversary “with a handful of powerful servers and a couple gigabit links can de-anonymize hundreds of thousands Tor clients and thousands of hidden services within a couple of months.”

Many readers will be very happy to read about the this discovery, in fact, Tor network is used by many criminals for illicit activities, like botnet control, sale of drugs and weapons, and distribution of child pornography.

I personally hope that the researchers will carefully disclose the results of their study, notifying to Tor’s developers how to fix potential flaw in the Tor network design.

The Tor network is also precious tool to avoid censorship and oppressive governments and the discovery of the two researchers could be abused.
This is probably already happening. Tor users that adopt the anonymizing network and other technologies to avoid control and Internet monitoring are tracked by the NSA for example.

Stay tuned… if the discovery is confirmed, millions of Tor network users are at risk.

Source

Write for us

Disclaimer:

The articles and content found on Dark Web News are for general information purposes only and are not intended to solicit illegal activity or constitute legal advice. Using drugs is harmful to your health and can cause serious problems including death and imprisonment, and any treatment should not be undertaken without medical supervision.

Is the Tor Network Broken?,
Read >>
3 Young People Arrested For Peddling Drugs From Darknet
0 / 5 ( votes)

LEAVE A REPLY

Please enter your comment!
Please enter your name here