
“Computer scientists have devised an attack on the Tor privacy network that in certain cases allows them to deanonymize hidden service websites with 88 percent accuracy. Hidden services allow people to host websites without end users or anyone else knowing the true IP address of the service. The deanonymization requires the adversary to control the Tor entry point for the computer hosting the hidden service. It also requires the attacker to have previously collected unique network characteristics that can serve as a fingerprint for that particular service. The new research underscores the limits to anonymity on Tor, which journalists, activists, and criminals alike rely on to evade online surveillance.”
Related posts:
Georgia congressman complains: ‘I’m stuck here making $172,000 a year’
US Refines "Military Options" Ahead Of Syrian Strikes
Forget Too Big to Fail Banks — It's Time to Break Up the Fed
Brooklyn family accuses NYPD of causing father’s fatal heart attack
1,358 Children and Counting — Trump’s “Zero Tolerance” Border Policy
Democrats may sell political opinions to credit card companies
UK Police's Facial Recognition Systems Are Wrong Up To 98% Of The Time
Why the Only Real Way to Buy Bitcoins Is on the Streets
Gun Owners Boycott a Huge Outdoors Show. Show Shuts Down.
What An American Should Do If You're Put On The U.S. Government's Kill List
E-Driver's Licenses Enable Round-the-Clock Surveillance
“You’re Sick, Fatso. I’m Billing Your Insurance Company.”
Can Free Zones in the Middle of the Jungle Save the Developing World?
Officer Caught On Tape Taking $2,650 During Untaxed Cigarette Raid
Peter Schiff: How the Media Deceived Me