Monthly Archives: March 2015

Guarantees for online anonymity?

Posted: March 12, 2015 at 7:47 pm

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example. Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services.

One of the most popular tools is Tor. Since the beginning of the year, alone more than two million users have used it to anonymize their Internet connection data. These services will not only conceal browsing behavior, but also the identity of the user, and that of any other recipients. These will usually be other websites, but could also be another person. Tor works in a way that allows users to establish a connection that is then upheld through its own network. The Tor network comprises up to 6,000 servers, mostly run by volunteers, which computer scientists refer to as "nodes." And since every node only receives the minimal amount of data necessary to relay the information in question, it becomes far more difficult to de-anonymize both the transmitter and the recipient of the data.

"The Tor network isn't perfect, however," says Esfandiar Mohammadi, a researcher at the Research Center for IT Security, CISPA, and a doctoral candidate at the Graduate School for Computer Science in Saarbrcken. "For one, unanticipated attacks at a network level can endanger anonymity. Also, the degree of anonymity the network achieves is highly variable, since volunteers don't necessarily operate their nodes continually or regularly," says Mohammadi.

In collaboration with CISPA researcher Sebastian Meiser, who is also a postgraduate at the Saarbrcken Graduate School for Computer Science, Mohammadi developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network. According to the researchers, this feature is a worldwide first.

"An attacker that compromises Tor servers can derive the identity of a user with a certain probability. This is exactly what our system calculates," Sebastian Meiser explains. The two Saarbrcken researchers based their technique, which they named "MATor," on a mathematical model that they extended to include different categories of possible attacks. "In order to indicate the probability of de-anonymization, our program performs its calculations using data that is aggregated once an hour and published on the network immediately. MATor also takes the specifics of the respective Internet connection into account, as well as the individual configurations of the Tor software," Meiser says. This feature is also intended as a basis for a so-called plugin, a small extension program for the software "Tor Browser" that the researchers now want to develop. Integrated into the Tor software, this could run in the background and simply notify users as soon as their connection became too unsafe.

Story Source:

The above story is based on materials provided by University Saarland. Note: Materials may be edited for content and length.

See original here:
Guarantees for online anonymity?

Posted in Tor Browser | Comments Off on Guarantees for online anonymity?

uTorrent 3.4.2 turns your PC into cryptocurrency miner…Bye Bye – Video

Posted: at 7:47 pm


uTorrent 3.4.2 turns your PC into cryptocurrency miner...Bye Bye
uTorrent 3.4.2 build 38913 installs EpicScale software for some users, without consent. This turns your PC into a slave cryptocurrency miner while it idles. ...

By: Byte My Bits

Link:
uTorrent 3.4.2 turns your PC into cryptocurrency miner...Bye Bye - Video

Posted in Cryptocurrency | Comments Off on uTorrent 3.4.2 turns your PC into cryptocurrency miner…Bye Bye – Video

Bitcoin Cryptocurrency Automated Arbitrage – Video

Posted: at 7:47 pm


Bitcoin Cryptocurrency Automated Arbitrage
Bitcoin automated trader with arbitrage overseeing 3 markets out of 30 in scope. Output from the console.

By: codemasterPL

Read more:
Bitcoin Cryptocurrency Automated Arbitrage - Video

Posted in Cryptocurrency | Comments Off on Bitcoin Cryptocurrency Automated Arbitrage – Video

Reggie Middleton on cryptocurrency and earnings season – Video

Posted: at 7:47 pm


Reggie Middleton on cryptocurrency and earnings season
Erin sits down with Reggie Middleton CEO of Veritaseum. Reggie tells us how the earnings season been for US banks and what it says about their longer term earnings. He believes earnings...

By: Boom Bust

Visit link:
Reggie Middleton on cryptocurrency and earnings season - Video

Posted in Cryptocurrency | Comments Off on Reggie Middleton on cryptocurrency and earnings season – Video

Onecoin Event Guest Speaker Mr Sebastian Greenwood B Piamond at Bangkok [Series 07] – Video

Posted: at 7:47 pm


Onecoin Event Guest Speaker Mr Sebastian Greenwood B Piamond at Bangkok [Series 07]
OneCoin provides a once in a lifetime opportunity, revolutionizing the business world of today #39;s digital economy. The OneCoin concept is born out of the success of the pioneering cryptocurrency,...

By: Expensive Keywords

Read the original:
Onecoin Event Guest Speaker Mr Sebastian Greenwood B Piamond at Bangkok [Series 07] - Video

Posted in Cryptocurrency | Comments Off on Onecoin Event Guest Speaker Mr Sebastian Greenwood B Piamond at Bangkok [Series 07] – Video

Bitcoin Transaction – Bitcoin Billionaire – Video

Posted: at 7:47 pm


Bitcoin Transaction - Bitcoin Billionaire
Bitlanders bitcoin billionaire.

By: Replay

See the article here:
Bitcoin Transaction - Bitcoin Billionaire - Video

Posted in Bitcoin | Comments Off on Bitcoin Transaction – Bitcoin Billionaire – Video

Win Five Bitcoins with CoinTelegrah and Share The Bitcoin – Video

Posted: at 7:47 pm


Win Five Bitcoins with CoinTelegrah and Share The Bitcoin
With a service based around the idea earning Bitcoins by telling new people about the world of digital currency, Share The Bitcoin has been expanding the user base of Bitcoin itself since its...

By: Nik Nom

Original post:
Win Five Bitcoins with CoinTelegrah and Share The Bitcoin - Video

Posted in Bitcoin | Comments Off on Win Five Bitcoins with CoinTelegrah and Share The Bitcoin – Video

Lecture 4 How to Store and Use Bitcoins – Video

Posted: at 7:47 pm


Lecture 4 How to Store and Use Bitcoins
Fourth lecture of the Bitcoin and cryptocurrency technologies online course. Course website: https://piazza.com/princeton/spring2015/btctech/home For the ful...

By: Bitcoin Course

View original post here:
Lecture 4 How to Store and Use Bitcoins - Video

Posted in Bitcoin | Comments Off on Lecture 4 How to Store and Use Bitcoins – Video

VanosEnigmA 096 Phoenix World Currency MarkOfTheBeast RFID Bibel Prophecy InnerEarth SciFi Bitcoin – Video

Posted: at 7:47 pm


VanosEnigmA 096 Phoenix World Currency MarkOfTheBeast RFID Bibel Prophecy InnerEarth SciFi Bitcoin
http://www.twitter.com/VanosEnigmA http://www.facebook.com/VanosEnigma http://www.twitter.com/CryptoEEV Thank you mucho meow for your donation: Bitcoin Address: 1FJ9ZZcnKqhiiYWNhbpBaqy9QQHTBSmsP8 ...

By: VanosEnigmA Enigmaisland

Visit link:
VanosEnigmA 096 Phoenix World Currency MarkOfTheBeast RFID Bibel Prophecy InnerEarth SciFi Bitcoin - Video

Posted in Bitcoin | Comments Off on VanosEnigmA 096 Phoenix World Currency MarkOfTheBeast RFID Bibel Prophecy InnerEarth SciFi Bitcoin – Video

Bitcoin Stealer app – Video

Posted: at 7:47 pm


Bitcoin Stealer app
Get this app now while btc is growing, only 10usd special promo price. Bitcoin is rising everyday, have you heard about the guy who bought for 27usd worth of bitcoin and forget about it, 2...

By: John badon

See more here:
Bitcoin Stealer app - Video

Posted in Bitcoin | Comments Off on Bitcoin Stealer app – Video