{"id":45890,"date":"2014-11-18T07:47:15","date_gmt":"2014-11-18T12:47:15","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/a-computer-science-professor-found-a-way-to-identify-most-anonymous-tor-users\/"},"modified":"2014-11-18T07:47:15","modified_gmt":"2014-11-18T12:47:15","slug":"a-computer-science-professor-found-a-way-to-identify-most-anonymous-tor-users","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/a-computer-science-professor-found-a-way-to-identify-most-anonymous-tor-users\/","title":{"rendered":"A Computer Science Professor Found A Way To Identify Most &#39;Anonymous&#39; Tor Users"},"content":{"rendered":"<p><p>    Tor was supposed to be an anonymous means of browsing the    Internet, but a study by computer science    professorSambuddho Chakravarty reveals that 81    percent of those using Tor can be de-anonymized by exploiting a    technology in Cisco routers called Netflow. The ploy reveals a    user's originating IP address, which is analogous to    identifying someone's home address even if he or she uses a    P.O. box.  <\/p>\n<p>    By facilitating anonymity online, Tor enables people around the    world to communicate securely and get around firewalls that    might block certain sites in their countries. It's also the    technology that facilitated the notorious Silk Road (and    subsequent iterations), seeing people trade bitcoins for    assorted black market paraphernalia through the mail. The    nonprofit project enables freedom of the press around the world    and, for at least a time, presented a means to mail-order    drugs.  <\/p>\n<p>    The Tor browser works by way of decentralization. Your Web    traffic doesn't come directly to you, but instead arrives by    way of a number of relays. Each relay makes it increasingly    difficult to identify the traffic's ultimate destination,    shielding you from being associated with it. The trade-off is    one of speed for purported anonymity, but this Netflow exploit    is only the latest among a few incidents that seem to    be punching holes in the browser's popular conception as a    bulletproof security fiend.  <\/p>\n<p>    \"That general understanding is wrong,\" Kevin Johnson, CEO of    independent security consulting firm    SecureIdeas,said. \"Tor runs on top of a complex    series of interconnections between apps and the underlying    network. To expect that everything in that system is going to    understand and respect it, it becomes very complex.\"  <\/p>\n<p>    Consider Web traffic as though it were automobile traffic    flowing down a highway. To assume that all Web traffic will    follow Tor's anonymizing \"rules\" is akin to assuming that every    car on the highway follows all the traffic regulations, but \"as    we know by looking at any news report, a number of people have    accidents every day,\" Johnson said. \"The exact same thing    happens with Tor. Its a highway system with an application    that says 'go this way,' and we expect all of our apps to    follow those signs.\"  <\/p>\n<p>    Johnson says that Cisco's Netflow, which sits at the heart of    the exploit that can de-anonymize these Tor users, is    comparable to the Department of Transportation's analytics on a    given stretch of road. Instead of identifying the types of    traffic -- 15 percent motorcycles, 25 percent sedans, 40    percent semi trucks, and so on --Netflow can break down    Internet traffic into its various types, say 50 percent email,    35 percent Web traffic, and the remainder being Tor.    Chakravarty'stechnique for exploiting Netflow works by    injecting a repeating traffic pattern, such as the common HTML    files that most Tor users are likely to be accessing, into the    connection and then checking the routers flow records to check    for a match. If it finds a match, then the user is no longer    anonymous.  <\/p>\n<p>    \"When youre looking at those kind of attacks, they're done by    government state agencies, usually foreign governments    suppressing protesters or tracking dissidents. It's harder to    do in America because there's so much other traffic,\" said    Jayson Street, who bears the job title of Infosec Ranger    atsecurity assessment firm Pwnie Express.  <\/p>\n<p>    The takeaway is clear: Tor used by itself is hardly some    one-stop shop to ensure anonymity online. \"End users dont know    how to properly configure it -- they think its a silver    bullet,\" Street said. \"They think once they use this tool, they    dont have to take other precautions. It's another reminder to    users that nothing is 100 percent secure. If you're trying to    stay protected online, you have to layer your defenses.\"  <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.ibtimes.com\/computer-science-professor-found-way-identify-most-anonymous-tor-users-1724964\/RK=0\/RS=VjuHX54y00IygT6sctJESmmdS6Y-\" title=\"A Computer Science Professor Found A Way To Identify Most &#39;Anonymous&#39; Tor Users\">A Computer Science Professor Found A Way To Identify Most &#39;Anonymous&#39; Tor Users<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Tor was supposed to be an anonymous means of browsing the Internet, but a study by computer science professorSambuddho Chakravarty reveals that 81 percent of those using Tor can be de-anonymized by exploiting a technology in Cisco routers called Netflow. The ploy reveals a user's originating IP address, which is analogous to identifying someone's home address even if he or she uses a P.O. box <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/a-computer-science-professor-found-a-way-to-identify-most-anonymous-tor-users\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-45890","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/45890"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=45890"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/45890\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=45890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=45890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=45890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}