{"id":191872,"date":"2017-05-09T15:06:20","date_gmt":"2017-05-09T19:06:20","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/three-vulnerabilities-allow-spies-to-detect-tor-browsers-cloud-pro\/"},"modified":"2017-05-09T15:06:20","modified_gmt":"2017-05-09T19:06:20","slug":"three-vulnerabilities-allow-spies-to-detect-tor-browsers-cloud-pro","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/three-vulnerabilities-allow-spies-to-detect-tor-browsers-cloud-pro\/","title":{"rendered":"Three vulnerabilities allow spies to detect Tor browsers &#8211; Cloud Pro"},"content":{"rendered":"<p><p>    Tor, once known only by network nerds, has now become something    of a hot topic. This is thanks largely to the anonymous    network's reputation for hosting drug marketplaces like Silk    Road, and other unsavoury sites.  <\/p>\n<p>    But what exactly is Tor? What is it good for? Does it have any    legitimate uses? And how can those not versed in the finer    details of network technologies actually access it?  <\/p>\n<p>    08\/04\/2017:The Tor browser discloses    information that a determined attacker could potentially use to    identify who uses the browser to surf the web, according to a    computer forensic expert.  <\/p>\n<p>    Dr Neal Krawetz revealed the issues in his blog last week, suggesting that instead of    masking the identity of the user through layers of encryption,    Tor browsers do give away details about the person surfing the    dark web.  <\/p>\n<p>    The first issue Krawetz encountered is to do with the window    and screen size. Most browsers set the window size smaller than    the screen size but Tor sets the two as the same. This means    JavaScript can immediately detect the Tor browser, making the    user vulnerable because they can be denied access to the site.  <\/p>\n<p>    The second issue he found is that the Tor browser tries to size    the Window at 1,000 x 1,000 pixels but if the screen is smaller    then it chooses a width that is a multiple of 200 pixels and a    height that is a multiple of 100 pixels.  <\/p>\n<p>    However, on Mac OS, the browser sometimes miscalculates the    initial Window size, an inconsistent problem that he puts down    to the height of the dock. This means that a user can be    profiled: if the Tor browser window size is a multiple of 200    across but not a multiple of 100 tall then it is a Tor Browser    on Mac OS X.  <\/p>\n<p>    The third and last issue is to do with the scrollbar size in    the Tor browser. The browser does not normalise the viewport    size, so if scrollbars are displayed then the viewport size can    be subtracted from the windows size to find out the thickness    of scrollbars. This can then be used to find out which    operating system a user is on, as different OS's and desktops    use different default thicknesses.  <\/p>\n<p>    Krawetz pointed out the scrollbar thickness for a number of    platforms, including: \"The Tor browser on MacOS 10.11 uses a    default thickness of 15 pixels. The Tor browser on Windows    7\/8\/10 uses scrollbars that are 17 pixels thick. The Tor    browseron Linux uses scrollbars that are 10-16 pixels    thick.\"  <\/p>\n<p>    He then said that if you can detect the Tor browser - as    possible in the first issue, and the scrollbars are 17 pixels    thick, then you can work out that it's the Tor browser on    Windows. He added: \"If the scrollbars are 15 pixels thick, then    it's either Linux or Mac OS X (check the window height to    distinguish Mac from Linux; see issue #2). And any other    thickness denotes Linux.\"  <\/p>\n<p>    Krawetz stated how hard it is to report an error to the Tor    Project. Even though the project asks on its website and    Twitter for users to report security issues, when he has he has    usually been met with silence. \"Over the last few years, I've    tried to report some of these profiling methods (and solutions)    to the Tor Project, but each time has resulted in failure,\" he    wrote.\"Often, my attempts to report a vulnerability or    profiling risk has been met with silence.\"  <\/p>\n<p>    03\/04\/2017:Tor browser will rely on more Rust    code  <\/p>\n<p>    The Tor browser will take greater advantage of the Rust    programming language developed by Mozilla to keep user    interactions more secure, it has been revealed.  <\/p>\n<p>    Although Tor developers have been gunning for the news for a    long time (since 2014, in fact), the Mozilla-powered code will    play a bigger role in the secretive browser's future.  <\/p>\n<p>    According to     Bleeping Computer, Tor developers met last week to discuss    the future of the private browser and decided to use more of    the C++-based code in future, hoping to replace the majority of    its legacy C and C++ base in the coming months or years.  <\/p>\n<p>    \"We didn't fight about Rust or Go or modern C++. Instead, we    focused on identifying goals for migrating Tor to a memory-safe    language, and how to get there,\" Tor developer Sebastian Hahn    said.  <\/p>\n<p>    \"With that frame of reference, Rust emerged as a extremely    strong candidate for the incremental improvement style that we    considered necessary.\"  <\/p>\n<p>    The reason why it decided to make such a big change was because    a tiny mistake in the C programming language used in the    current version of Tor could have a huge impact on users, Tor    developer Isis Agora Lovecruft said on Twitter.  <\/p>\n<p>    \"A tipping point in our conversation around 'which safe    language' is the Tor Browser team needs Rust because more &    more Firefox is in Rust. Also the barrier to entry for    contributing to large OSS projects written in C is insanely    high.\"  <\/p>\n<p>    13\/12\/2016:The first sandboxed version    of the Tor Browser was released in alpha last weekend, bringing    privacy fans one step closer to secure browsing.  <\/p>\n<p>    Version 0.0.2 of the software was released by Tor developer    Yawning Angel on Saturday, who is tackling the project largely    single-handed. Official binaries are yet to be released, but    early adopters can take it for a spit by compiling the code    themselves from GitHub.  <\/p>\n<p>    The project has been a labour of love for Yawning Angel. \"We    never have time to do this,\" he said back in October. \"We have    a funding proposal to do this but I decided to do it separately    from the Tor Browser team. I've been trying to do this since    last year.\"  <\/p>\n<p>    The efforts have been given new urgency by a zero-day    vulnerability in Firefox. Discovered last month, the error was    being used to de-anonymise Tor users, as the browser is heavily    based on Firefox code.  <\/p>\n<p>    Sandboxed instances of Tor are different from the normal    version in that they run in a self-contained silo. This means    that if an attacker uses an exploit against the browser, the    amount of data it can collect through it from the rest of the    machine and operating system is limited.  <\/p>\n<p>    However, Yawning Angel has stressed that the software is still    a very early alpha, and cannot be trusted to be entirely    secure. \"There are several unresolved issues that affect    security and fingerprinting,\" he wrote as part of the    software's README.  <\/p>\n<p>    01\/12\/2016:A zero day vulnerability    found in both Firefox and Tor web browsers has been exploited    in the wild, allowing attackers to target users for their IP    and MAC addresses.  <\/p>\n<p>    Internet security firm Malwarebytes first discovered the flaw,    which was shown to be almost identical to the one used by the    FBI to expose Tor browser users in 2013.  <\/p>\n<p>    \"The exploit took advantage of a bug in Firefox to allow the    attacker to execute arbitrary code on the targeted system by    having the victim load a web page containing malicious    JavaScript and SVG code,\" said Daniel Veditz, security lead at    Mozilla, in a blog post on    Wednesday.  <\/p>\n<p>    Hackers were able to exploit Tor and Firefox browsers to send    user hostnames and IP and MAC addresses to a remote server    identified as 5.39.27.226, which has now been taken down.  <\/p>\n<p>    \"The goal is to leak user data with as minimal of a footprint    as possible. There's no malicious code downloaded to disk, only    shell code is ran directly from memory,\" said Jerome    Segura, lead malware intelligence analyst at Malwarebytes.  <\/p>\n<p>    \"Browsers and their plugins remain the best attack vector to    deliver malware or leak data via drive-by attacks,\" added    Segura.  <\/p>\n<p>    Malwarebytes recommend users adjust the security settings of    their Tor browser to 'High' within the privacy settings, which    will thwart any similar attacks of this kind. Users running the    Malwarebytes Anti-Exploit tool will already by protected from    the vulnerability. Both Mozilla and Tor have released patches    to address the security flaw.  <\/p>\n<p>    The term Tor can be used to refer to both the anonymous Tor    network and the Tor Browser software used to access it.    Designed for privacy and anonymity, it is used by journalists,    hackers, privacy campaigners and criminals alike, and with    around 2.5 million daily users, its the internets biggest    avenue of anonymous online activity,  <\/p>\n<p>    The systems aim is to prevent a users web activity (such as    traffic, communication and search history) from being    externally traced, usually by government or law enforcement    agencies. Its commonly used to access whats known as the Dark    Web  hidden servers which are often used to host black market    transactions.  <\/p>\n<p>    Tor was originally known as The Onion Router, so named because    it uses onion routing encryption protocols. This essentially    functions like pass-the-parcel; data packets sent through Tor    are secured with multiple layers of encryption.  <\/p>\n<p>    They are then sent in a randomised pattern through Tors    network of volunteer relay nodes. At each point in the relay, a    layer of encryption is peeled away, which reveals the next    point in the chain. Once the last layer of encryption has been    removed, the data is passed on to its intended destination.  <\/p>\n<p>    The key factor here is that each relay in the chain can only    see the network location of the node immediately before and    after it  the one it received the data from, and the one its    sending it to.  <\/p>\n<p>    This means that at no point along the chain are both the sender    and recipients network details visible at the same time, and    thus cant be linked.  <\/p>\n<p>    Tor is simply a network system, and can be used to provide    untraceable access to any internet service or website. Its    often used as an innocent precaution by those who dont want    their actions traced by increasing levels of online government    surveillance.  <\/p>\n<p>    However, Tor also has a sinister side: the Dark Web. For    obvious reasons, the prospect of untraceable web activity has    proved very attractive to certain elements of society, and Tor    has now become synonymous with varying levels of criminal    activity.  <\/p>\n<p>    Almost all of this activity occurs on servers inaccessible via    standard web connections, known as hidden services. These    servers are configured to only accept traffic coming from the    Tor network, ensuring anonymity for both the servers operator    and its users. They are also inaccessible from standard    browsers.  <\/p>\n<p>    Hidden services are extremely popular for the trade and    distribution of illegal or objectionable materials. According    to a study by Dr. Gareth Owen, narcotics alone are the subject    of around 15 per cent of hidden services on the Dark Web, with    hacking, fraud and counterfeiting all being popular topics.  <\/p>\n<p>    Infamous Dark Web marketplaces like Silk Road and Evolution    have brought this topic to the fore, and law enforcement    agencies are becoming increasingly more aware of these    services. The Tor network has apparently remained secure so    far, but the US government, in particular, is heavily invested    in cracking Tors integrity.  <\/p>\n<p>    While many use the Deep Web and the Dark Web synonymously,    important to note the distinction between the two.  <\/p>\n<p>    As defined by Michael K. Bergman in his 2000 paper on the    subject, the Deep Web refers simply to content that is not    indexed by search engines, and thus extremely difficult for the    average user to find.  <\/p>\n<p>    The Dark Web, by contrast, is designed to be hidden from the    rest of the internet. It consists of darknets; sub-sections    of the internet which can only be accessed through systems like    Tor.  <\/p>\n<p>    The Dark Web is largely comprised of illegal or antisocial    activity, while the Deep Web is often made up of innocuous but    irrelevant web pages, such as archived content, multimedia    elements or non-linked pages.  <\/p>\n<p>    If youre looking to use Tor, be it for exploring the Dark Web    or just for a little extra privacy, the first thing youll need    is the Tor Browser, downloaded through The Tor Projects    website. Its designed to be the best way to use Tor and is    specially-configured to encrypt and protect your web traffic.  <\/p>\n<p>    Available for Linux, Mac and PC, just download the Tor Browser    installation file from the Tor Projects website, install it    like any other browser, and following a brief setup, youll be    all set to use Tor.  <\/p>\n<p>    Youll also need a little patience. The relay method that makes    Tor secure also means that its not quite as fast as a regular    broadband connection, so you might find yourself waiting longer    than usual for pages to load.  <\/p>\n<p>    If youre just looking for the security of knowing no-one will    be able to trace your everyday internet activity, then youre    now all set to use Tor. Simply browse as normal, and the Tor    network will do all the work to ensure that youre kept safe    from prying eyes.  <\/p>\n<p>    If you want to dive into the murky territory of the Dark Web,    however, youll need to do a little homework first. Its not    quite as simple as users may be used to, and given its    dangerous nature, its best to go in prepared.  <\/p>\n<p>    Before you do anything else, wed advise anyone thinking of    engaging in any Dark Web activity to ensure theyve got the    most up-to-date security possible; you never know whos out    there, after all. Also, be very, very careful not to    accidentally break any laws, and make sure you know where    youre browsing to.  <\/p>\n<p>    Once youve got Tor set up, youll need to start looking for    Dark Web sites. Unlike regular websites, Tors hidden services    arent accessible through regular web searches and dont have    conventional web URLs.  <\/p>\n<p>    Instead, theyre accessed through .onion addresses, which are    16-character alphanumeric strings, randomly generated when the    hidden service is created. The .onion address for The Tor    Projects homepage, for example, is <a href=\"http:\/\/idnxcnkne4qt76tg.onion\/\" rel=\"nofollow\">http:\/\/idnxcnkne4qt76tg.onion\/<\/a>  <\/p>\n<p>    Unless you know its specific address, you wont be able to    access the hidden service. Some are a closely-guarded secret,    but many of the more common Dark Net sites (both criminal and    legitimate) are catalogued by directories like The Hidden Wiki,    available as both a regular website and a hidden service.  <\/p>\n<p>    There are also basic search engines like Torch, which crawl and    index Dark Web sites based on content. Theyre nowhere near as    sophisticated as regular search engines, though and are at a    disadvantage due to the Dark Webs clandestine nature.  <\/p>\n<p>    Of course, there are ways to access Dark Web sites without    using the Tor Browser itself. Tor2Web is a project that uses    Tor-based proxies to let users access Tor hidden services    without using the Tor Browser itself.  <\/p>\n<p>    With a standard web browser, adding the suffixes .to, .city,    .cab or .direct to the end of any .onion Tor link will send    your connection through to a proxy server configured to use    onion routing protocols. This server will then visit the    address on your behalf, and relay the page contents back to    your browser.  <\/p>\n<p>    However, while this method is far easier than installing the    Tor Browser, it is inherently traceable and provides no    anonymity to the user. Using the dedicated browser remains the    safest method of traversing the Dark Web for anyone with more    than an academic interest in its contents.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cloudpro.co.uk\/leadership\/5581\/tor-browser-news-three-vulnerabilities-allow-spies-to-detect-tor-browsers\" title=\"Three vulnerabilities allow spies to detect Tor browsers - Cloud Pro\">Three vulnerabilities allow spies to detect Tor browsers - Cloud Pro<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Tor, once known only by network nerds, has now become something of a hot topic. This is thanks largely to the anonymous network's reputation for hosting drug marketplaces like Silk Road, and other unsavoury sites. But what exactly is Tor <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/three-vulnerabilities-allow-spies-to-detect-tor-browsers-cloud-pro\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-191872","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/191872"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=191872"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/191872\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=191872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=191872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=191872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}