Tor de-anonymization techniques: How people have lost their anonymity? Let's study real-world cases and try to learn how to avoid these errors.

Presented at Still Hacking Anyway (SHA2017), Aug. 5, 2017, 4:10 p.m. (60 minutes).

Tor offers great anonymity and privacy for millions of people. However, there are some Tor de-anonymization techniques that work. This presentation demonstrates de-anonymization of Tor hidden services and users. #NetworkSecurity Tor offers censorship-resistant and distributed platform that can provide easy-to-implement anonymity to web users, websites and other web services. Tor enables web servers to hide their location and Tor users can connect to these authenticated hidden services while the server and the user both stay anonymous. However, throughout the years of Tor existence some users lost their anonymity. Let's look the technical limitations of anonymity and operational security challenges that Tor user will encounter. Also, hands-on demonstration of anonymity exposures on leverage of traffic correlation attacks, electronic fingerprinting, and some Tor specific configuration failures.

Presenters:

  • Juha Nurmi
    Cyber security researcher Juha Nurmi is the founder of the Ahmia search engine project. He is interested online anonymity.

Links:

Similar Presentations: