Home » Tag Archives: tor

Tag Archives: tor

Tor anonymizers.jpg

Tor Browser Updates Patch IP Leaking TorMoil Bug

With the new updates in Tor Browser version 7.0.9 for Linux and Mac operating systems, Tor is now patched up from a new vulnerability that was recently discovered that would cause Tor Browser to leak the IP address of its user. The vulnerability was given the name TorMoil by the person who discovered, Filippo Cavallarin of wearesegment.com. The bug does ... Read More »

The New York Times Launches a Tor Version of their Website

While many people think the dark web is no good except for buying drugs and guns, a new innovation has now made it possible to also read the news on the same platform. The New York Times announced on the 27th of last month that it was launching a Tor Onion Service of its website, at the address, https://www.nytimes3xbfgragh.onion.top/. The ... Read More »

The SSH Public Key Authentication Protocol Over Tor – How Vulnerable It Is to Timing Attacks?

The Secure Shell (SSH) public key authentication protocol represents one of the most popularly used authentication methods that rely on public key cryptography. Apart from its massive popularity, the SSH protocol hasn’t been massively studied and even the most advanced users often misconceive its functionality. Version 2 of the SSH protocol is presently being used by millions of internet connected ... Read More »

Tor Fingerprinting – Is the Tor Browser Immune Against Browser Fingerprinting?

On October 4, 2013, the Guardian published a report which stated that Edward Snowden, a former CIA employee and whistleblower, sent the British newspaper classified documents that proved that the National Security Agency (NSA) had been repeatedly making attempts to formulate successful attacks against Tor, or the onion router. However, the report claimed that all of NSA’s attempts failed to ... Read More »

TorPolice – A Novel Framework For Enforcing Access Control Policies Across the Tor Network

The Tor network represents the most popular anonymity network, which is currently used by millions of users all over the world. Nevertheless, access control doesn’t exist for users of the Tor network, which renders the network susceptible to malicious attacks and botnet abuse. For instance, adversaries often exploit exit relay nodes utilizing them as stepping stones for various forms of ... Read More »

Tor Update Supports v3 Onion Services

  The second latest alpha build of Tor, Tor 0.3.2.2-alpha, enabled the more secure “next-generation hidden services protocol” (aka v3 onion services). Tor Project President Roger Dingledine said that next generation hidden (onion) services fix security and design flaws found in the original or legacy hidden services. He explained that mistakes he had made in the 2004 onion service protocol ... Read More »

Tor (the myth and reality.PNG

Government Contractor Offers Million Dollar Bounty for Tor 0-Days

A cybersecurity company has offered bounties of up to 1 million US dollars for Tor Browser 0-day vulnerabilities. Zerodium’s Tor 0-day bounty program is open until November 30th at 6pm Eastern, or until Zerodium terminates the program after having issued 1 million dollars for Tor 0-days. The company has stated that it plans to sell these zero day exploits to ... Read More »

Decentralized Darknet Markets Have Arrived: OpenBazaar 2.0 Beta Launches with Support for Tor

  OpenBazaar recently launched the beta version of OpenBazaar 2.0, finally allowing people to anonymously buy and sell products with cryptocurrency. In January of this year a Developer Release of version 2.0 of the OpenBazaar software was released, followed by the alpha version. The previous releases of OpenBazaar 2.0 used a testnet, but now with the beta version of the ... Read More »

Czechs Turning to Tor as Privacy Concerns Increase

According to the Czech News Agency (ČTK), citing Pravo, the number of Czechs using Tor for access to the darknet is steadily increasing. They are not using it for “drugs, arms, or child porn,” for the most part, Pravo published in a late August edition. Czechs are using Tor out of a growing concern for their privacy and internet footprints. ... Read More »

An Overview of Modern Tor Deanonymization Attacks

Tor was designed to provide a decentralized, censorship resistant network that can offer internet users, websites and various web services anonymity via easy-to-implement means. Nevertheless, since the advent of Tor, some users have failed to maintain their anonymity. Throughout this article, we will discuss Tor’s deanonymization techniques that are available today. We will go through traffic and timing correlation attacks, ... Read More »

Tor anonymizers.jpg

Tor Project Blocked A Brazilian University From Running A Relay

A Brazilian university was banned from using a Tor relay since the researchers harvested the .onion.top addresses of the visitors. A research project at the University of Campinas in São Paulo worked on a tool that could differentiate the malicious hidden service from the benign ones. The researchers ran a Tor relay for the project, however, the Tor Project discovered ... Read More »

Targeting Adversaries & Deanonymization Attacks Against Tor Users

  Tor is a P2P network for promoting traffic security of various forms of internet communications for millions of users worldwide. In most cases, Tor users are very unlikely to become the target of an adversary, as they are namely shielded via Tor against opportunistic local hackers, local censorship authorities and hostile destinations. Deanonymizing adversaries act through attempting to attack ... Read More »

d3318503-7eff-4422-ad9b-6094a8b87b5f.png

Russia Goes After Tor, VPNs, and Proxies in Latest Bill

In Russia, a bill further restricting internet freedom and privacy has come close to becoming law. The bill finally takes steps to prevent the public from using Tor, VPNs, and web proxies. All that remains before the bill becomes a law is the signature of President Vladimir Putin. Both the Russian Parliament and the Russian Federation Council approved the bill ... Read More »

Installing-Tor-in-Kali-Linux.jpg

Tor Node Operator Freed from Custody

Dmitry Bogatov was arrested on April 6th, in Moscow, charged with “inciting terrorist activities”. The basis of these allegations was that Bogatov had posted a still image from rapper Jay-Z’s “No Church in the Wild” music video. Yes, that’s right. Bogatov was arrested for supposedly posting an American music video. Granted, the still image was one of a gang of ... Read More »

Tor anonymizers.jpg

ROUTING ALL TRAFFIC THROUGH TOR: PRO AND CONS

Every reader of DeepDotWeb knows the importance of surfing the web protected by the Tor network and therefore uses a Tor Browser Bundle. The TBB not only helps us connecting through the Tor network while surfing the internet allowing us to visit onion sites and hiding our ip, but it also uses many security built-in plugins to increase our anonymity ... Read More »