Home » Tag Archives: tor

Tag Archives: tor

Group-of-Hackers.jpg

Research: Identifying bitcoin addresses linked to transactions on darknet marketplaces and other Tor hidden services

Due to its pseudo-anonymous nature and decentralized infrastructure, bitcoin has been exploited in darknet marketplaces which facilitate the trading of a myriad of illegal products and services, including illicit drugs, stolen personal data, weapons, hacking tools, and more. The history of bitcoin transactions is recorded on a public ledger, known as the blockchain. However, the real world identity of a ... Read More »

Research: Phishing attacks via Tor hidden services

Phishing is by far one of the most serious threats against the security of personal data. Launching phishing attacks often relies on sending emails that seem to have been sent by a trusted entity. The goal is to trick the recipient to provide sensitive personal information including usernames, passwords, online banking credentials, etc. The emails attempt to deceive the victims ... Read More »

map.png

Research: The challenges associated with geographical avoidance of Tor nodes

Traffic analysis attacks are by far among the most serious threats compromising the anonymity of Tor users. When law enforcement agencies or malicious adversaries attempt to deanonymize Tor users, they launch traffic confirmation attacks and observe encrypted traffic in order to extract metadata. When combined with routing attacks, traffic confirmation attacks are extremely efficient in deanonymization of Tor users. Even ... Read More »

Research: Improving Tor circuits’ anonymous communication forwarding strategy

Anonymous communication can be achieved by concealing the relationship between the origin and destination of traffic flow via means of a special method, so that an adversary cannot identify the communication relationship or the data being exchanged between both ends of the communication route. Anonymous protection has to achieve three main goals: recipient anonymity, sender anonymity, and impossibility to correlate ... Read More »

Research: Tor marketplaces as a threat to national e-ID infrastructures

Electronic identification (e-ID) has been increasingly adopted by many states during the past few years. The past decade has witnessed large-scale initiatives in many European countries to develop their very own e-ID infrastructures. These forms of digital infrastructures vary in terms of frameworks, institutional entities involved, and the types of services accessible by citizens via their issued digital identities. Occasionally, ... Read More »

TOR has Released OnionShare 2, a Major Version with macOS Sandbox

After about a year of engaging work from a dedicated team of software designers, developers, and translators, OnionShare has released OnionShare 2, a major next-generation version with exciting updates. OnionShare is an open source tool used to anonymously and securely send and receive files using The Onion Router (TOR) services. Unlike on other platforms such as DropBox, Google Drive, WeTransfer, ... Read More »

Tor performance.png

PredicTor – A path selection technique to improve the performance of Tor

The Tor protocol provides online anonymity for millions of users worldwide. However, Tor is much slower than regular internet browsing software. Many researchers proposed circuit building strategies that aim at improving the performance of Tor via optimizing its latency and bandwidth. Congestion-Aware Routing (CAR) is currently the most efficient solution for improving Tor performance. CAR is a decentralized approach that ... Read More »

Tor (the myth and reality.PNG

Research: A new look at common attacks against the Tor network protocol

Tor is currently by far the most used anonymous communication protocol. Today, there are hundreds of thousands of users, including journalists, military personnel, hackers, etc, from over 75 countries all over the world who rely on Tor to protect their privacy and remain anonymous while surfing the internet. However, there are many security issues that may risk the privacy and ... Read More »

tor-attack.png

Research: Classification of attacks on Tor clients and Tor hidden services

Anonymity network protocols were namely developed to protect the privacy of censored online users. Anonymity is accomplished via implanting users’ data in between multiple encryption layers and via forwarding network traffic through a diverse group of proxies and/or relay nodes. Onion networks are by far the most widely used solutions within such context. There are presently several anonymizing network protocols ... Read More »

Prime partitioned blockchain 2.PNG

Research: Tor and the blockchain – Cybercriminals’ unmatchable combination

Law enforcement agencies are currently faced by enormous challenges when having to investigate and analyze a cybercrime. Most of these challenges can be attributed to the wide availability of anonymity browsing software and cryptocurrencies. A recently published paper aims at examining how anonymity browsing software, such as Tor, in combination with cryptocurrencies, pose a great challenge during investigation of a ... Read More »

tor1.jpg

Research: An efficient Tor crawler

The Tor network is by far the most popular darknet, which not only facilitates anonymous browsing, but also hosts a large number of illicit marketplaces, as well as multiple forms of illegal activities. The Tor protocol protects hosted websites, which are known as hidden services, against undesirable tracking and surveillance. The number of Tor based hidden services has been steadily ... Read More »

macsymantec.jpg

Research: ToRank – A novel system for identification of suspicious and malicious Tor hidden services

The Tor network currently hosts thousands of hidden services. A significant proportion of these hidden services can be associated with harmful and suspicious activities. Many onion domains have been linked to distribution of malware. In 2013, Freedom Hosting, a company that hosted Tor hidden services, was found to spread malware on all hidden services hosted on its servers. This malware ... Read More »