
“Computer scientists have devised an attack on the Tor privacy network that in certain cases allows them to deanonymize hidden service websites with 88 percent accuracy. Hidden services allow people to host websites without end users or anyone else knowing the true IP address of the service. The deanonymization requires the adversary to control the Tor entry point for the computer hosting the hidden service. It also requires the attacker to have previously collected unique network characteristics that can serve as a fingerprint for that particular service. The new research underscores the limits to anonymity on Tor, which journalists, activists, and criminals alike rely on to evade online surveillance.”
Related posts:
Web currency Bitcoin seeks legitimacy, stability via foundation
U.S. Welfare Spending: 4 Times the Amount Necessary to End Poverty
The European Economy You Must Own
Activists to U.S.: Release 5 Prisoners Serving Life Terms for Marijuana
Marijuana: The Next Diabetes Drug?
Feds investigating discrimination accused of discrimination
The Future of Building Your Own Guns
Man trampled as hundreds of desperate Greeks scuffle for food
Record 90.5 Million Out Of Labor Force; Half A Million Drop Out In One Month
David Stockman: There are Bubbles All Over, Hide in Cash
Preposterous Waste, Pentagon Style
L.A. Residents Plead With LAPD On Signs, Shirts: ‘Don’t Shoot, I’m Not Chris Dorner’
The Benefits of Bitcoin in International Travel
The Obamacare Problem Isn’t Messaging, It’s Statism
Secret Service: Contact Us to ‘Report a Tweet’