MIT researchers figure out how to break Tor anonymity without cracking encryption

Child porn, racism and terrorism are always the wedge issues used by the state to destroy any form of anonymity.

Networking Stop

The Tor network has millions of daily users who rely on it for anonymous access to resources on the open internet and within Tor itself. There have been various attacks on the anonymous aspect of Tor over the years, but a new proof of concept from researchers at MIT demonstrates what may be the simplest way yet to find out what people are accessing through Tor. Luckily, there’s also a fix Tor’s operators can implement.


or was originally an acronym for “the onion router,” which is an accurate description of how it’s structured. It offers anonymous access to online resources by passing user requests through multiple layers of encrypted connections. It all starts at the entry node, sometimes called the guard. That’s the only system that knows your real IP address, but the next node in the chain only knows the IP of the entry node, the next only knows…

View original post 356 more words


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s