Sources: How you can be deanonymized through Tor

These are the Sources for our article on being deanonymized through Tor.

Sources: How you can be deanonymized through Tor

Read complete article here


These are the sources for our article on being deanonymized through Tor.

Sources Below:

[1]

Tech Times

FBI Drops Child Pornography Case To Avoid Disclosing Tor Vulnerability
Alexandra Burlacu
07 March 2017
https://www.techtimes.com/articles/200592/20170307/fbi-drops-child-pornography-case-to-avoid-disclosing-tor-vulnerability.htm

[2]

RestorePrivacy

Is Tor Trustworthy and Safe?
Sven Taylor
December 14, 2021
https://restoreprivacy.com/tor/

[3]

Black Hat anti-Tor talk smashed by lawyers’ wrecking ball
Darren Pauli
22 Jul 2014
https://www.theregister.com/2014/07/22/legal_wrecking_balls_break_budget_tor_popping_talk/

JavaScript Attacks


[4a]

Hacker News

Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched
By Ravie Lakshmanan
May 26, 2022
https://thehackernews.com/2022/05/tails-os-users-advised-not-to-use-tor.html

[4b]

Pwn2Own Vancouver 2022

The Results
By Dustin Childs
May 18, 2022
https://www.zerodayinitiative.com/blog/2022/5/18/pwn2own-vancouver-2022-the-results

[5]

Zd Net

Tor Browser 8.5.2 release patches critical Firefox vulnerability exploited in the wild
Charlie Osborne
June 20, 2019
https://www.zdnet.com/article/tor-browser-8-5-2-release-patches-firefox-flaw-being-exploited-in-the-wild/

[6]

HackRead

Tor Browser Impacted by Firefox’s Zero-day Vulnerability
Uzair Amir
December 1, 2016
https://www.hackread.com/tor-browser-firefoxs-zero-day-vulnerability/

[7a]

Jose Carlos Norte

Advanced Tor Browser Fingerprinting
March 6th, 2016
http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html

[7b]

HackRead

Mouse movements are enough to track down Tor users
(and CPU intensive JavaScript)
Uzair Amir
March 15, 2016
https://www.hackread.com/tracking-tor-users-with-mouse-movements/

[8]

ArsTechnica

Attackers wield Firefox exploit to uncloak anonymous Tor users
Dan Goodin
Aug 5, 2013
https://arstechnica.com/information-technology/2013/08/attackers-wield-firefox-exploit-to-uncloak-anonymous-tor-users/

Malicious Exit Nodes


[9]

The Record

Thousands of Tor exit nodes attacked cryptocurrency users over the past year
Catalin Cimpanu, May 9, 2021
https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year/

[10]

Official Tor Project

Tor security advisory: exit relays running sslstrip in May and June 2020
By isabela, August 14, 2020
https://blog.torproject.org/bad-exit-relays-may-june-2020/

[11]

Zd Net

A mysterious group has hijacked Tor exit nodes to perform SSL stripping attacks
Written by Catalin Cimpanu
https://www.zdnet.com/article/a-mysterious-group-has-hijacked-tor-exit-nodes-to-perform-ssl-stripping-attacks/

[12]

Security Week

Malicious Actor Controlled 23% of Tor Exit Nodes
By Ionut Arghire, August 11, 2020
https://www.securityweek.com/malicious-actor-controlled-23-tor-exit-nodes

[13]

Karlstad University

Spoiled Onions: Exposing Malicious Tor Exit Relays
Philipp Winter, Stefan Lindskog
https://www.cs.kau.se/philwint/spoiled_onions/techreport.pdf

[14]

Computer World

6 Ways to Stay Safe From Compromised Tor Exit Nodes
By Gavin Phillips, May 09, 2019
https://www.computerworld.com/article/2486774/tor-exit-nodes-attempt-to-spy-on-encrypted-traffic–researchers-find.html

Malicious Middle Relays


[15]

Noir Dot News

Hundreds of Malicious Tor Relays Detected
By Dr. Dang, March 22, 2022
https://www.noirdotnews.com/news/hundreds-of-malicious-tor-relays-detected/

on KAX17


[16]

Bruce Schneier

Someone Is Running Lots of Tor Relays
Bruce Schneier, Dec 7, 2021
https://www.schneier.com/blog/archives/2021/12/someone-is-running-lots-of-tor-relays.html

Malicious Entry Guards


[17]

ArsTechnica

New attack on Tor can deanonymize hidden services with surprising accuracy
Dan Goodin
July 31, 2015
https://arstechnica.com/information-technology/2015/07/new-attack-on-tor-can-deanonymize-hidden-services-with-surprising-accuracy/

[18]

Massachusetts Institute of Technology and Qatar Computing Research Institute

Shoring up Tor
Researchers mount successful attacks against popular anonymity network — and show how to prevent them.
Larry Hardesty
July 28, 2015
https://news.mit.edu/2015/tor-vulnerability-0729

Cross Device Tracking


[19]

Bleeping Computer

Ultrasound Tracking Could Be Used to Deanonymize Tor Users
By Catalin Cimpanu, January 3, 2017
https://www.bleepingcomputer.com/news/security/ultrasound-tracking-could-be-used-to-deanonymize-tor-users/

[20]

University of California

Santa Barbara Cybersecurity @ BlackHat Conference
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking
Vasilios Mavroudis, Doctoral Researcher UCL
Federico Maggi, Researcher UCSB
Christopher Kruegel, UCSB

Full PDF of the Paper:
https://www.blackhat.com/docs/eu-16/materials/eu-16-Mavroudis-Talking-Behind-Your-Back-Attacks-And-Countermeasures-Of-Ultrasonic-Cross-Device-Tracking.pdf

Brief Summary:
https://www.blackhat.com/eu-16/briefings/schedule/#talking-behind-your-back-attacks-and-countermeasures-of-ultrasonic-cross-device-tracking-4864

BlackHat Conference: USBC Presents Cybersecurity Research of the Paper
Jan 8, 2020
Invidious Mirror to Avoid Youtube:
https://invidious.sethforprivacy.com/watch?v=THFOnA6m8KM

Other


BoingBoing

Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites
Cory Doctorow
Fri Jul 1, 2016
https://boingboing.net/2016/07/01/researchers-find-over-10###0-spyi.html

Patrick Gray

(14 years old but still relevant)
The hack of the year
November 13, 2007
https://www.smh.com.au/technology/the-hack-of-the-year-20071113-gdrkxw.html

Wired

WikiLeaks Was Launched With Documents Intercepted From Tor
Kim Zetter
Jun 1, 2010
https://www.wired.com/2010/06/wikileaks-documents/

https://cdn-resprivacy.pressidium.com/wp-content/uploads/2019/02/10_honions-sanatinia.pdf

SC Magazine UK

Tor network exit nodes found to be sniffing passing traffic
Jul 01, 2015
Tom Reeve
https://web.archive.org/web/20190807043523/
& https://www.scmagazineuk.com/tor-network-exit-nodes-found-sniffing-passing-traffic/article/1479106

HackerNews

Over 25% Of Tor Exit Relays Spied On Users’ Dark Web Activities
May 10, 2021
Ravie Lakshmanan
https://thehackernews.com/2021/05/over-25-of-tor-exit-relays-are-spying.html

BitDefender

Threat Actor Compromised More than 25 Percent of Tor Network Relays, Research Shows
Silviu STAHIE
May 11, 2021
https://www.bitdefender.com/blog/hotforsecurity/threat-actor-compromised-more-than-25-percent-of-tor-network-relays-research-shows


If you really want to learn and take your privacy to the next level, subscribe to our new content via: Nostr, Bastyon, Session, RSS, Ethereum Push

Related Posts

Sources: Why KVM Whonix over Oracle VirtualBox

Sources: Why KVM Whonix over Oracle VirtualBox

references to our article on KVM Whonix over Oracle Virtual box

[SP]

Feb 1, 2024

Sources: Why is Google bad for your business?

Sources: Why is Google bad for your business?

These are the Sources for our article on Google is bad for business

[SP]

Jan 28, 2024

Sources: Elizabeth Warren says “Ban Bitcoin” but it’s Israel that funded Hamas

Sources: Elizabeth Warren says “Ban Bitcoin” but it’s Israel that funded Hamas

[ADMIN]

Dec 16, 2023

California AI bill FORCES social media digital ID

California AI bill FORCES social media digital ID

California just PASSED legislation that requires a Digital ID to view social media

[SP]

Aug 20, 2023