Categories: Science & Technology

Tor Project attack may have unmasked users for five months

An attack on Tor network may have unmasked users for five months, developers of software used to access the network say.

The Tor Project said that it believed the assault was designed to de-anonymize the net addresses of people operating or visiting hidden sites.

However, it said it was not sure exactly how users had been “affected”.

The project added that it believed it had halted the attack on July 4.

Tor allows people to visit webpages without being tracked and to publish sites whose contents does not show up in search engines.

The Tor Project said it believed that the infiltration had been carried out by two university researchers, who claimed at the start of July to have exploited “fundamental flaws” in Tor’s design that allowed them to unmask the so-called dark net’s users.

The two security experts, Alexander Volynkin and Michael McCord, had been due to give a talk at the Black Hat conference in Las Vegas next week. However, the presentation was cancelled at the insistence of lawyers working for their employer, Carnegie Mellon University.

“We spent several months trying to extract information from the researchers who were going to give the Black Hat talk, and eventually we did get some hints from them… which is how we started looking for the attacks in the wild,” wrote Roger Dingledine, one of the network’s co-creators, on the Tor Project’s blog.

Tor’s users include the military, law enforcement officers and journalists, who use it as a way of communicating with whistle-blowers

“They haven’t answered our emails lately, so we don’t know for sure, but it seems likely that the answer to [whether they were responsible] is yes.

“In fact, we hope they were the ones doing the attacks, since otherwise it means somebody else was.”

A spokesman from Carnegie Mellon University declined to comment.

Tor attempts to hide a person’s location and identity by sending data across the internet via a very circuitous route involving several “nodes” – which, in this context, means using volunteers’ PCs and computer servers as connection points.

Encryption applied at each hop along this route makes it very hard to connect a person to any particular activity.

To the website that ultimately receives the request, it appears as if the data traffic comes from the last computer in the chain – known as an “exit relay” – rather than the person responsible.

Tor’s users include the military, law enforcement officers and journalists – who use it as a way of communicating with whistle-blowers – as well as members of the public who wish to keep their browser activity secret.

But it has also been associated with illegal activity, allowing people to visit sites offering illegal drugs for sale and access to child abuse images, which do not show up in normal search engine results and would not be available to those who did not know where to look.

The Tor Project suggests the perpetrator compromised the network via a “traffic confirmation attack”.

This involves the attacker controlling both the first part of the circuit of nodes involved – known as the “entry relay” – as well as the exit relay.

By matching the volumes and timings of the data sent at one end of the circuit to those received at the other end, it becomes possible to reveal the Tor user’s identity because the computer used as an entry relay will have logged their internet protocol (IP) address.

The project believes the attacker used this to reveal hidden-site visitors by adding a signal to the data sent back from such sites that included the encoded name of the hidden service.

Because the sequence of nodes in a Tor network is random, the infiltrator would not be able to track every visit to a dark net site.

Tor also has a way of protecting itself against such a danger: rather than use a single entry relay, the software involved uses a few relays chosen at random – what are known as “entry guards”.

Even if someone has control of a single entry and exit relay, they should only see a fraction of the user’s traffic, making it hard to identify them.

However, the Tor Project believes the perpetrator countered this safeguard by using a second technique known as a “Sybil attack”.

This involved adding about 115 subverted computer servers to Tor and ensuring they became used as entry guards. As a result, the servers accounted for more than 6% of the network’s guard capacity.

This was still not enough to monitor every communication, but was potentially enough to link some users to specific hidden sites.

Several government agencies are interested in having a way to unmask Tor’s users.

Nancy Clayson

Nancy is a young, full of life lady who joined the team shortly after the BelleNews site started to run. She is focused on bringing up to light all the latest news from the technology industry. In her opinion the hi-tech expresses the humanity intellectual level. Nancy is an active person; she enjoys sports and delights herself in doing gardening in her spare time, as well as reading, always searching for new topics for her articles.

Recent Posts

Quincy Jones Dead at 91

Quincy Jones, the celebrated musician and producer who worked with Michael Jackson, Frank Sinatra, Ray…

5 hours ago

White House 2024: Voter Fraud Claims Flood Social Media

Misleading allegations, rumours and outright lies about voting and fraud are flooding online spaces in…

2 days ago

Spain: At Least 158 Killed In The Country’s Worst Flooding Disaster

At least 158 people have died in Spain's worst flooding disaster in generations. On October…

4 days ago

Russia Fines Google $20,000,000,000,000,000,000,000,000,000,000,000, Surpassing Global GDP

Google has been fined two undecillion (a two followed by 36 zeroes) roubles by a…

4 days ago

Financing Your Home Remodel: 7 Tips for Success

Embarking on a home remodel is an exciting journey, promising enhanced comfort, increased property value,…

2 weeks ago

Donald Trump Serves Up McDonald’s Fries While Kamala Harris Celebrates 60th Birthday with Church Choir

The US presidential candidates continued to campaign across key swing states on October 20. Footage…

2 weeks ago