Presented at
Still Hacking Anyway (SHA2017),
Aug. 5, 2017, 4:10 p.m.
(60 minutes).
Tor offers great anonymity and privacy for millions of people. However, there are some Tor de-anonymization techniques that work. This presentation demonstrates de-anonymization of Tor hidden services and users.
#NetworkSecurity
Tor offers censorship-resistant and distributed platform that can provide easy-to-implement anonymity to web users, websites and other web services. Tor enables web servers to hide their location and Tor users can connect to these authenticated hidden services while the server and the user both stay anonymous.
However, throughout the years of Tor existence some users lost their anonymity. Let's look the technical limitations of anonymity and operational security challenges that Tor user will encounter. Also, hands-on demonstration of anonymity exposures on leverage of traffic correlation attacks, electronic fingerprinting, and some Tor specific configuration failures.
Presenters:
-
Juha Nurmi
Cyber security researcher Juha Nurmi is the founder of the Ahmia search engine project. He is interested online anonymity.
Links:
Similar Presentations: