• Best VPN
  • Tests
  • Coupons
  • English
    • About Us
  • Français
Facebook Twitter Instagram
Facebook Twitter Instagram
Your Trusted VPN Experts
  • Best VPN
  • Tests
  • Coupons
  • English
    • About Us
  • Français
Your Trusted VPN Experts
News

Tor Traffic Compromised, “Aqua” on the Horizon

Dan ParkerBy Dan ParkerNovember 15, 2015Updated:November 15, 2022No Comments3 Mins Read
Share
Facebook Twitter Pinterest Email
NordBF banner

We’re running out of places to hide. The anonymous browsing protocol Tor is to undergo a remodel after news of leaks in the ceiling were discovered early last month. Both the FBI and the NSA have used their own methods to undermine the security of the anonymity relay service, each deploying tactics relative to their understanding of how the network was run over the past several years.

The FBI exploited javascript files in the Firefox program used to connect to Tor, whereas the NSA took the backdoor route, attempting to track and tag the activity of users who connect to the network and then use metadata to match up with their identities. The technique is called “traffic analysis”, and surprisingly has an almost 80% rate of success when predicting a link between an “anonymous” Tor user and someone who has been connecting to the standard internet under email clients using their real names.

“Our analysis shows that 80 percent of all types of users may be deanonymized by a relatively moderate Tor-relay adversary within six months,” the researchers write in a paper on their findings. “These results are somewhat gloomy for the current security of the Tor network.”

In an interview with MIT Technology Review, Aaron Johnson has been quoted as saying that the majority of those who choose the Tor network in an effort to keep themselves anonymous shouldn’t be concerned about their safety, however if they plan to spill state secrets or plan a terrorist plot anytime soon, they might want to reconsider before getting linked up on the next onion router.

It’s still unclear whether or not any agencies are actively monitoring the lines for this kind of activity, although given the presentations from 2006 and 2012, it’s clear they at least have an awareness of how to gain access to user information if they need to, and what kind of maneuvers are possible when dealing with multiple relays like those found in Tor.

Must Read  3 reasons to take advantage of NordVPN's low cost BF offer

Researcher at the Max Planck Institute for Software Systems in Germany, Stevens Le Blond summarizes the current situation well:

“Since 2006, the academic community has done much work on traffic analysis and has developed attacks that are much more sophisticated than the ones described in this report.”

LeBlond has been contributing as an engineer to a new anonymity project — dubbed Aqua. The connection protocol will supposedly work in similar fashion to Tor, but with extra protection designed to actively fight against the current methods of traffic analysis employed by international government agencies.

Until Aqua is available to the public, you can always use a premium VPN to connect to Tor to add extra layer of security and safety to all of your online activity. By configuring HideMyAss Pro VPN to run on a router running Tomato firmware, you can create a double-strength shield of privacy that not even the most advanced methods of decryption would dare to tangle with twice.

Share. Facebook Twitter Pinterest LinkedIn Email
Previous ArticleInstagram Blocked Amid Hong Kong Protests
Next Article HideMyAss launch revamped app with surprising new features
Dan Parker

Dan is a technology reporter from San Jose, California, currently living right in the heart of Silicon Valley. Raised around tech, he's found interests in various gadgets and the companies that make them for years. When not blogging about tech, he can be found hunting for music, shredding the slopes in South Lake, or whipping up a dish for friends in the kitchen.

Related Posts

DuckDuckGo app wants to make you invisible on Android

December 27, 2022

3 reasons to take advantage of NordVPN’s low cost BF offer

November 30, 2022

Our selection of the best VPN deals of November 2022

November 15, 2022

Comments are closed.

Do not miss out on the biggest sale of the year!

NordBF banner

Latest posts
  • What Is A VPN Used For? Top 5 reasons in 2023 January 16, 2023
  • DuckDuckGo app wants to make you invisible on Android December 27, 2022
  • What is the best VPN for Mac in 2023? November 30, 2022
  • 3 reasons to take advantage of NordVPN’s low cost BF offer November 30, 2022
  • StrongVPN review: an average VPN with limited features November 30, 2022
Facebook Twitter Instagram Pinterest
© 2023 Copyright VPN Creative

Type above and press Enter to search. Press Esc to cancel.