Home » Tag Archives: tor

Tag Archives: tor

deanonumization 2.jpg

Research: Comparing the performance of IP routing and onion routing (Tor)

The world is currently witnessing many political conflicts. Repressive governments are imposing sanctions on free speech. Many of these governments block the general public from accessing some websites, which led people in these countries to find solutions to be able to browse the internet freely. Researching solutions to this problem led to the practical deployment of a prototype model for ... Read More »

Watermark-Plugin.jpg

Recent flow watermarking techniques for detection of Tor hidden services

Tor is by far the most widely used anonymous network that is increasingly being exploited by users hosting and publishing content via hidden services. In most cases, Tor’s hidden services are used to distribute content that is morally or illegally deplorable, e.g. child pornography. Law enforcement agencies (LEAs) are constantly trying to identify users hosting and distributing such content. Innovative ... Read More »

A Review of Tor Browser 8.0

Tor users’ can now access the Tor Browser 8.0 from Tor Browser Project Page and distribution directory. This version allows users to connect to the Tor network with a higher level of online anonymity and privacy. Though Tor Browser 8.0 is a significant update, there are negative feedbacks from the users. Those using devices running on macOS systems have experienced ... Read More »

Tor (the myth and reality.PNG

Reconstructing Tor Circuits Using Compartment Adversaries and Monitoring of Cross-border Traffic

The Onion Routing (Tor) protocol represents a well established network routing system that is designed to provide users with low latency communication channels, that cannot be attacked by network level adversaries attempting to identify who is communicating with whom. It is clearly understood how the Tor network behaves whenever an adversary compromises a percentage of the onion routers, and especially ... Read More »

Tor anonymizers.jpg

Prevention of hacker intrusion via Tor circuit selection – A research paper

The Tor network has become the most widely used anonymous network that supports various forms of circuit based low latency internet connections. Nevertheless, recent incidents of security breaches reveal that the SSH protocol has been mostly utilized to launch malicious attacks by hackers. Even though a server side blocking mechanism, which can detect SSH connections individually, has been previously proposed ... Read More »

Tor anonymizers.jpg

The Onion Report: The Tor Project at HOPE

Every two years the Hackers On Planet Earth (HOPE) conference is held at the Hotel Pennsylvania in New York City. The Tor Project has held a panel discussion on the state of the Tor Project at each HOPE called The Onion Report, during which the new developments at the Tor Project are discussed. At this year’s HOPE, The Onion Report ... Read More »

Brave Web Browser Implements Private Tabs That Use Tor

The latest release of the Brave web browser includes a new privacy feature that is in beta testing. When a private tab is opened in version 0.23 of the Brave web browser, users now have the option to enable the new privacy feature that uses Tor onion routing to help increase privacy. This new feature makes private tabs actually private, ... Read More »

Cloudflare Integrates Tor Hidden Services to its DNS Services

Cloudflare has launched Tor integrated DNS services. The service is a Domain Name System (DNS) resolver which is similar to URLs such as ‘Cloudflare.com’ with their specific and corresponding numerical IP addresses. This helps users locate where a given domain is geographically hosted and can thereafter match it up with associated servers and hardware devices. This means that the name ... Read More »

Tor Project Ended Tor Messenger Development

The Tor Project announced the discontinuation of Tor Messenger, a messaging platform that incorporated Tor and OTR by default. In a blog post about the end of Tor Messenger support, the Tor Project gave three reasons for the decision. One of the more pressing reasons for ending Tor Messenger support, the blog post explained, was Florian Quèze’s discontinuation of Instantbird ... Read More »

Eavesdropping On Tor Exit Nodes

In the last article, I talked about the appropriate configuration of the Tor browser and the steps to follow to further strengthen our privacy. Now, we’ll see how it is possible to have our data leaked even if our Tor browser is working in the right manner. The first thing to point out, is that Tor encrypts our communication only ... Read More »

The Italian ANAC launched online whistleblowing platform using Tor onion services

The Italian National Anti-Corruption Authority (ANAC) has embraced and thereafter launched an online whistleblower platform using Tor onion services. This is expected to encourage and help whistleblowing to manage and expose illegal activities such as corruption cases in government organizations at the same time protecting individual identities. Millions of people make use of the Tor network daily and globally to ... Read More »

Tor anonymizers.jpg

How To Configure Tor Properly

Tor is a renowned must in the anonymity field, and the first fundamental step in your fight for privacy. You could think that the only thing that you need to hide your identity while surfing the web is to download the Tor browser bundle, but this is not enough. There are, in fact, wrong behaviours that can reveal your real ... Read More »