
“Computer scientists have devised an attack on the Tor privacy network that in certain cases allows them to deanonymize hidden service websites with 88 percent accuracy. Hidden services allow people to host websites without end users or anyone else knowing the true IP address of the service. The deanonymization requires the adversary to control the Tor entry point for the computer hosting the hidden service. It also requires the attacker to have previously collected unique network characteristics that can serve as a fingerprint for that particular service. The new research underscores the limits to anonymity on Tor, which journalists, activists, and criminals alike rely on to evade online surveillance.”
Related posts:
Medical marijuana an issue of importance for Johnson
Silicon Valley VC Thinks a Single Bitcoin Will Be Worth $100,000
Americans Can Be Executed Without Charges -- But Criminal Banks Can't Be Prosecuted
Why Your Town Is Going Broke
EFF awards Apple, Google perfect privacy scores
LAPD Cop Shoots Homeless Man to Death After Requesting ID
28 Detroit houses selling for $500 at county auction
EU backs plans by member states to arm Kurds in Iraq
Massachusetts billboard depicts little girl giving Obama the finger
Universities to MOOCs: We Will Assimilate You
Democrat seeks to defund Obama’s expansive war powers
Bitcoin Developer Sells $8 Million Worth Of Hardware In 24 Hours
Welfare office head, with gambling habit, embezzles nearly $300k
Greenwald's Partner Sues British Government Because of Detention
State Regulators Force Vermont's Only Bitcoin ATM Offline