Simplified Privacy

Sources: How you can be deanonymized through Tor

These are the sources for our article on being deanonymized through Tor.

Sources Below:


[1]
Tech Times
FBI Drops Child Pornography Case To Avoid Disclosing Tor Vulnerability
Alexandra Burlacu
07 March 2017
https://www.techtimes.com/articles/200592/20170307/fbi-drops-child-pornography-case-to-avoid-disclosing-tor-vulnerability.htm

[2]
RestorePrivacy.com
Is Tor Trustworthy and Safe?
Sven Taylor
December 14, 2021
https://restoreprivacy.com/tor/

[3]
Black Hat anti-Tor talk smashed by lawyers’ wrecking ball
Darren Pauli
22 Jul 2014
https://www.theregister.com/2014/07/22/legal_wrecking_balls_break_budget_tor_popping_talk/

JavaScript Attacks

[4a ]
Hacker News
Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched
By Ravie Lakshmanan
May 26, 2022
https://thehackernews.com/2022/05/tails-os-users-advised-not-to-use-tor.html

[4b]
Pwn2Own Vancouver 2022 – The Results
By Dustin Childs
May 18, 2022
https://www.zerodayinitiative.com/blog/2022/5/18/pwn2own-vancouver-2022-the-results

[5]
Zd Net
Tor Browser 8.5.2 release patches critical Firefox vulnerability exploited in the wild
Charlie Osborne
June 20, 2019
https://www.zdnet.com/article/tor-browser-8-5-2-release-patches-firefox-flaw-being-exploited-in-the-wild/

[6]
HackRead
Tor Browser Impacted by Firefox’s Zero-day Vulnerability
Uzair Amir
December 1, 2016
https://www.hackread.com/tor-browser-firefoxs-zero-day-vulnerability/

[7a]
Jose Carlos Norte
Advanced Tor Browser Fingerprinting
March 6th, 2016
http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html

[7b]
HackRead
Mouse movements are enough to track down Tor users
(and CPU intensive JavaScript)
Uzair Amir
March 15, 2016
https://www.hackread.com/tracking-tor-users-with-mouse-movements/

[8]
Attackers wield Firefox exploit to uncloak anonymous Tor users
Dan Goodin
Aug 5, 2013
https://arstechnica.com/information-technology/2013/08/attackers-wield-firefox-exploit-to-uncloak-anonymous-tor-users/

Malicious Exit Nodes

[9]
The Record
Thousands of Tor exit nodes attacked cryptocurrency users over the past year
Catalin Cimpanu, May 9, 2021
https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year/

[10]
Official Tor Project
Tor security advisory: exit relays running sslstrip in May and June 2020
By isabela, August 14, 2020
https://blog.torproject.org/bad-exit-relays-may-june-2020/

[11]
Zd Net
A mysterious group has hijacked Tor exit nodes to perform SSL stripping attacks
Written by Catalin Cimpanu
https://www.zdnet.com/article/a-mysterious-group-has-hijacked-tor-exit-nodes-to-perform-ssl-stripping-attacks/

[12]
Security Week
Malicious Actor Controlled 23% of Tor Exit Nodes
By Ionut Arghire, August 11, 2020
https://www.securityweek.com/malicious-actor-controlled-23-tor-exit-nodes

[13]
Karlstad University
Spoiled Onions: Exposing Malicious Tor Exit Relays
Philipp Winter, Stefan Lindskog
https://www.cs.kau.se/philwint/spoiled_onions/techreport.pdf

[14]
6 Ways to Stay Safe From Compromised Tor Exit Nodes
By Gavin Phillips, May 09, 2019
https://www.computerworld.com/article/2486774/tor-exit-nodes-attempt-to-spy-on-encrypted-traffic–researchers-find.html

Malicious Middle Relays

[15]
Noir Dot News
Hundreds of Malicious Tor Relays Detected
By Dr. Dang, March 22, 2022
https://www.noirdotnews.com/news/hundreds-of-malicious-tor-relays-detected/

on KAX17

[16]
Bruce Schneier
Someone Is Running Lots of Tor Relays
Bruce Schneier, Dec 7, 2021
https://www.schneier.com/blog/archives/2021/12/someone-is-running-lots-of-tor-relays.html

Malicious Entry Guards


[17]
ArsTechnica
New attack on Tor can deanonymize hidden services with surprising accuracy
Dan Goodin
July 31, 2015
https://arstechnica.com/information-technology/2015/07/new-attack-on-tor-can-deanonymize-hidden-services-with-surprising-accuracy/

[18]
Massachusetts Institute of Technology and Qatar Computing Research Institute
Shoring up Tor
Researchers mount successful attacks against popular anonymity network — and show how to prevent them.
Larry Hardesty
July 28, 2015
https://news.mit.edu/2015/tor-vulnerability-0729

Cross Device Tracking

[19]
Bleeping Computer
Ultrasound Tracking Could Be Used to Deanonymize Tor Users
By Catalin Cimpanu, January 3, 2017

https://www.bleepingcomputer.com/news/security/ultrasound-tracking-could-be-used-to-deanonymize-tor-users/

[20]
University of California, Santa Barbara Cybersecurity @ BlackHat Conference

Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking

Vasilios Mavroudis, Doctoral Researcher UCL
Federico Maggi, Researcher UCSB
Christopher Kruegel, UCSB

Full PDF of the Paper:
https://www.blackhat.com/docs/eu-16/materials/eu-16-Mavroudis-Talking-Behind-Your-Back-Attacks-And-Countermeasures-Of-Ultrasonic-Cross-Device-Tracking.pdf

Brief Summary:
https://www.blackhat.com/eu-16/briefings/schedule/#talking-behind-your-back-attacks-and-countermeasures-of-ultrasonic-cross-device-tracking-4864

BlackHat Conference: USBC Presents Cybersecurity Research of the Paper
Jan 8, 2020
Invidious Mirror to Avoid Youtube:
https://invidious.sethforprivacy.com/watch?v=THFOnA6m8KM

Other

BoingBoing
Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites
Cory Doctorow
Fri Jul 1, 2016
https://boingboing.net/2016/07/01/researchers-find-over-100-spyi.html

(14 years old but still relevant)
The hack of the year
By Patrick Gray
November 13, 2007
https://www.smh.com.au/technology/the-hack-of-the-year-20071113-gdrkxw.html

Wired
WikiLeaks Was Launched With Documents Intercepted From Tor
Kim Zetter
Jun 1, 2010
https://www.wired.com/2010/06/wikileaks-documents/

https://cdn-resprivacy.pressidium.com/wp-content/uploads/2019/02/10_honions-sanatinia.pdf

SC Magazine UK
Tor network exit nodes found to be sniffing passing traffic
Jul 01, 2015
Tom Reeve
https://web.archive.org/web/20190807043523/

https://www.scmagazineuk.com/tor-network-exit-nodes-found-sniffing-passing-traffic/article/1479106

Over 25% Of Tor Exit Relays Spied On Users’ Dark Web Activities
May 10, 2021
Ravie Lakshmanan
https://thehackernews.com/2021/05/over-25-of-tor-exit-relays-are-spying.html

Threat Actor Compromised More than 25 Percent of Tor Network Relays, Research Shows
Silviu STAHIE
May 11, 2021
https://www.bitdefender.com/blog/hotforsecurity/threat-actor-compromised-more-than-25-percent-of-tor-network-relays-research-shows


What is a Tor Relay?
https://www.eff.org/pages/what-tor-relay

Related Articles

Why is Telegram horrible

–No MetaData Protection(Who and When) –Only Mobile is Encrypted(Phones have insecure hardware) [1] –Invented their own encryption algorithmUnaudited with a history of security vulnerabilities [2]

Read More »

Leaked Lies at Google

Google accidentally leaked their search API on Github, giving everyone insight into that they: –Lied that they track users clicks as a factor for search

Read More »