“Computer scientists have devised an attack on the Tor privacy network that in certain cases allows them to deanonymize hidden service websites with 88 percent accuracy. Hidden services allow people to host websites without end users or anyone else knowing the true IP address of the service. The deanonymization requires the adversary to control the Tor entry point for the computer hosting the hidden service. It also requires the attacker to have previously collected unique network characteristics that can serve as a fingerprint for that particular service. The new research underscores the limits to anonymity on Tor, which journalists, activists, and criminals alike rely on to evade online surveillance.”
Related posts:
Alleged Silk Road Founder's Mother: No Murder-For-Hire Charge
After being hacked again, IRS shuts down e-File PIN service
There’s No End in Sight to the Bull Market in Stocks
Bipartisan Hemp, Medical Marijuana Bills Introduced in Congress
Rand Paul Will Introduce Fourth Amendment Restoration Act Of 2013
BTCTurk becomes the first Turkish lira-to-bitcoin exchange
What the Passport Pitchmen Don't Tell You...
California school district preps for lockdowns with 1,800 plastic classroom toilets
Newtown approves gun ordinance restricting recreational shooting
H.K. Politician's Son-In-Law Won't Face Charges For TSA Impersonation
What Does Government Do When People Start Living Healthier? Tax That
NSA routinely tapped in-flight Internet, intercepted exported routers
Cops Charge Black Man With Hate Crime For Calling Them 'Nazis'
“Happy Birthday” copyright defense: Those “words” and “text” are ours
Do Police See Guns as a threat to "Officer Safety"?