Jump to content

Researchers identify TOR users hidden identity.

LOGO.png       NRL-quad.jpg


A group of researchers from Georgetown University and the US Naval Research Laboratory say it's easier to identify TOR users than they believed.

We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realistic adversaries in the Tor network or in the underlying Internet.

Our results show that Tor users are far more susceptible to compromise than indicated by prior work,

A important thing to point out though is the "By Realistic Adversaries" part of the papers title.

With realistic adversaries they mean governments and ISP's as they needed direct access to internet exchanges or ISP's autonomous systems to trace the users.

The paper also pointed out that using BitTorrent on TOR makes you drastically easier to trace.

imgres.jpg

 


Source(s) / Full article:

The paper: http://media.koenvds.nl/LTT/NEWS/TOR/NOT%20SECURE/usersrouted-ccs13.pdf

New article: http://www.theregister.co.uk/2013/09/01/tor_correlation_follows_the_breadcrumbs_back_to_the_users/

Respect the Code of Conduct!

>> Feel free to join the unofficial LTT teamspeak 3 server TS3.schnitzel.team <<

>>LTT 10TB+ Topic<< | >>FlexRAID Tutorial<<>>LTT Speed wave<< | >>LTT Communies and Servers<<

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×