Home » Tag Archives: tor

Tag Archives: tor

New OSX Malware Uses Tor and a MITM Proxy

Years ago, many believed Apple’s OSX was immune to viruses or malware. However in 2014 and 2015, this notion changed even though Mac specific infections existed since the early 2000s. But between 2014 and 2015, reported infections more than doubled. But because of timely security updates, among other factors, MacOS or OSX still remained more secure than some alternative operating ... Read More »

CiantiMF – An Android OS Security Framework For Protection Against Tor Botnet Malware

The number of individuals using online payment systems via mobile devices is increasing steadily, which attracts hackers who utilize sophisticated pieces of malware to increase the impact of their malicious attacks. By far, the android OS is the most popular mobile device OS in the whole world. Accordingly, security of android devices is increasingly becoming a hot topic. The Security ... Read More »

Deadmann : A New Dead Man Switch’s Network That Utilizes The Tor Network

Deadmann is a newly proposed anonymous network protocol which is comprised of multiple dead man’s switches that can share data even when a user across the network becomes incapacitated. Previously proposed models of dead man’s switches failed at achieving the following: Preserve users’ anonymity Enable users to efficiently manage their own data Encrypt users’ data in a manner that can ... Read More »

Russian Tor Exit Node Operator Arrested

On April Fools Day, Russian authorities began an investigation into posts made online calling for protests in Moscow on April 2nd. Later that week authorities arrested Dmitry Bogatov, a math teacher at the Moscow Law and Finance University, on suspicion that he violated section 3 of Article 212 of the Russian criminal code. Under that section of Article 212, Bogatov ... Read More »

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, there are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

onion routing with identity.png

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, the are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

Classification of Illegal Activities On the Tor Network

If we envision the internet as an ocean, the Surface Web represents no more than the superficial waves flowing on top. The deep web, on the other hand, represents information that is deeply sunken and cannot be accessed by conventional search engines. The Deep Web contains a number of Darknets, that cannot also be indexed by conventional search engines, and ... Read More »

Is The Tor Browser Fully Anonymous? (The Myth and Reality)

Many think that Tor is a fully anonymous and secure means for browsing the internet, that doesn’t give a chance to anyone to monitor one’s browsing behavior and trace it back to his/her physical location, but is this really true? Tor is not perfectly anonymous, as it has a group of risks and limitations, which one should pay attention to, ... Read More »

A Comprehensive Privacy Analysis of Tor Hidden Services

Tor is one of the most popular darknets, which is known for its high levels of anonymity. Even though Tor’s protocol and its relay security have been thoroughly studied, there is currently no detailed analysis of the framework and privacy of hidden web services on this widely used darknet. To address this, a group of researchers formulated a specialized analysis ... Read More »

Tor marketplaces 1.PNG

Exploratory Data Analysis for Tor Marketplaces – The Drugs’ Case

The world of anonymous marketplaces represents a novel channel for black markets, which offer a wide variety of illegal merchandize. For most marketplaces on the darknet, the overall incidence of sales is still not comparable with the sales incidence of similar physical markets. Nevertheless, given the fact that it reflects an essential trade channel, offering opportunities to new as well ... Read More »

DoJ Drops Child Porn Charges to Keep Tor Exploit Confidential

Last April, the FBI refused to comply with a federal judge when he requested information about the Bureau’s Tor exploit. The FBI used a piece of malware called a Network Investigative Technique or NIT against a massive darknet child pornography website. The malware exposed site viewers to the FBI who subsequently arrested several hundred suspects.. However, the FBI’s struggle to ... Read More »

Tor anonymizers.jpg

Proactive Response and Detection for TOR (PReDTOR) – A Tool for De-anonymizing Tor Traffic

Tor is a free open source software that enables users to browse the internet anonymously. It utilizes a network of proxy servers from all parts of the world, known as nodes, that route internet connections. Tracing internet traffic sent via Tor represents a daunting task, because it operates via means of encrypted protocols such as HTTPS. Accordingly, determining whether data ... Read More »

OpenBazaar Finally Integrates Tor

On January 18th OpenBazaar released their Milestone 1 Developer Release of OpenBazaar 2.0, a new version of the software which is built on the decentralized InterPlanetary File System (IPFS). The new version of OpenBazaar includes long awaited privacy features, such as support for Tor. On February 14th it was revealed that the code to allow Tor integration with OpenBazaar was ... Read More »