1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Researchers improve de-anonymization attacks for websites hiding on Tor

Discussion in 'Network World' started by RSS, Jul 30, 2015.

  1. RSS

    RSS New Member Member

    Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.

    The new attack, which improves upon previous traffic fingerprinting techniques, was devised by researchers from the Massachusetts Institute of Technology (MIT) and the Qatar Computing Research Institute (QCRI), who found ways to differentiate between different types of connections in a user’s encrypted Tor traffic.

    The Tor anonymity network was built to hide from network snoopers which websites or other Internet resources that user is accessing. It does this by wrapping the user’s requests in several layers of encryption and routing them through multiple computers that run the Tor software.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page