- Spotify will soon let you block R. Kelly Monday 6:01 PM
- New Click to Pray app lets you pray with Pope Francis Monday 5:30 PM
- Social media influencer known for hiking in bikinis dead at 36 Monday 4:54 PM
- Trump posts altered pics on social media to make fingers look longer, report Monday 3:20 PM
- Twitch user banned after telling woman to ‘kill yourself’ during stream Monday 3:06 PM
- Facebook introduces ‘Community Actions’ tool to petition the government Monday 2:04 PM
- Sarah Sanders, NRA deliver truly misguided MLK tributes today Monday 12:58 PM
- MAGA teen who confronted Native elder says he ‘respects all races’ Monday 12:57 PM
- Popular YouTube channel in danger of disappearing because of copyright claims Monday 12:24 PM
- The Krassensteins’ Reddit AMA gets trolled off the internet Monday 12:08 PM
- No, Trump didn’t break open the Pizzagate scandal in 2011 Monday 11:23 AM
- Producer of anti-abortion film says Facebook refuses to run his ads Monday 10:58 AM
- Ja Rule thinks he was also a victim of Fyre Fest Monday 10:21 AM
- YouTube beef between RiceGum and H3H3 gets ugly—and personal Monday 10:02 AM
- ‘Fox & Friends’ accidentally airs obituary graphic for Ruth Bader Ginsburg Monday 9:40 AM
Can one of the most popular and powerful anonymity tools on the Internet be broken?
Is Tor, one of the most popular and powerful anonymity tools on the Internet, broken?
Two hackers are promising to show how they’re able to deanonymize Tor users with a measly $3,000 budget at Black Hat 2014, a major hacking conference in Las Vegas next month.
“In this talk, we demonstrate how the distributed nature, combined with newly discovered shortcomings in design and implementation of the Tor network, can be abused to break Tor anonymity,” the presenters, Alexander Volynkin and Michael McCord, explain.
The briefing is titled, “You Don’t Have to be the NSA to Break Tor: Deanonymizing Users on a Budget.”
With “a handful of powerful servers and a couple gigabit links”—easily within the resources of the world’s major intelligence agencies, criminal collectives, hacktivist groups, private companies, and more—thousands of Tor clients and hidden services can be revealed “within a couple of months,” the pair says.
Volynkin, a research scientist, and McCord, a software vulnerability analyst, haven’t revealed many specifics to the public yet, but many Tor community members are hoping that they’ve followed responsible disclosure practices and have notified Tor’s developers of any potential exploits that can put the anonymity of millions of users at risk.
Documents revealed in 2013 due to Edward Snowden’s NSA leaks revealed details that the intelligence agency had tried but largely failed to break Tor. The NSA slides even called Tor “the King of high secure, low latency Internet anonymity,” with “no contenders for the throne in waiting.” Last week, it was revealed that the NSA targets even those who read about Tor online as “extremists.”
No one has yet seen or reviewed the talk, so it’s impossible to verify the presenters’ claims. Even though the Tor community has been talking at length about the $3,000 demonstration, no official Tor developer has given comment.
The demonstration will cover “the nature, feasibility, and limitations of possible attacks, and then dive into dozens of successful real-world de-anonymization case studies, ranging from attribution of botnet command and control servers, to drug-trading sites, to users of kiddie porn places,” the presenters say.
Black Hat USA 2014 takes place Aug. 2-7 in Las Vegas.
Photo via Alex/Flickr (CC BY 2.0)
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.