TY - GEN
T1 - Tor de-anonymisation techniques
AU - Nurmi, Juha
AU - Niemelä, Mikko S.
N1 - jufoid=62555
PY - 2017
Y1 - 2017
N2 - Tor offers a censorship-resistant and distributed platform that can provide easy-to-implement anonymity to web users, websites, and other web services. Tor enables web servers to hide their location, and Tor users can connect to these authenticated hidden services while the server and the user both stay anonymous. However, throughout the years of Tor’s existence, some users have lost their anonymity. This paper discusses the technical limitations of anonymity and the operational security challenges that Tor users will encounter. We present a hands-on demonstration of anonymity exposures that leverage traffic correlation attacks, electronic fingerprinting, operational security failures, and remote code execution. Based on published research and our experience with these methods, we will discuss what they are and how some of them can be exploited. Also, open problems, solutions, and future plans are discussed.
AB - Tor offers a censorship-resistant and distributed platform that can provide easy-to-implement anonymity to web users, websites, and other web services. Tor enables web servers to hide their location, and Tor users can connect to these authenticated hidden services while the server and the user both stay anonymous. However, throughout the years of Tor’s existence, some users have lost their anonymity. This paper discusses the technical limitations of anonymity and the operational security challenges that Tor users will encounter. We present a hands-on demonstration of anonymity exposures that leverage traffic correlation attacks, electronic fingerprinting, operational security failures, and remote code execution. Based on published research and our experience with these methods, we will discuss what they are and how some of them can be exploited. Also, open problems, solutions, and future plans are discussed.
U2 - 10.1007/978-3-319-64701-2_52
DO - 10.1007/978-3-319-64701-2_52
M3 - Conference contribution
AN - SCOPUS:85028453023
SN - 978-3-319-64700-5
T3 - Lecture Notes in Computer Science
SP - 657
EP - 671
BT - Network and System Security
PB - Springer
T2 - International Conference on Network and System Security
Y2 - 1 January 2000
ER -