Sunday, August 2, 2015

Without Cracking Any Encryption Spies Can Unmask Tor Users

Tor (The Onion Tor) Network is using for the anonymous surfing over the internet. Now, the Tor Browser is in danger because the "Spies" who's only intention is to gather information by intruding the other's network.


A team of security researchers from Massachusetts Institute of Technology (MIT) have developed digital attacks that can be used to unmask Tor hidden services in the Deep Web with a high degree of accuracy.

The journalists, hackers ans internet users all are using the TOR network to surf on the internet anonymously. Tor provide anonymity to its user and tracking of the activity done by the user is almost very difficult.

User's who are connected to TOR network gets the encrypted network from where their ISP cannot find the logs or activity of that user and IP of the TOR user are also changed once they are connected to the TOR Network.

Without Decrypting the TOR Network or Traffic the Identities can be Revealed.

The Net Securoty team from MIT and Qatar computing research institute claimed that their is a new vulnerability in the TOR's Guard Gateway that can be exploited to detect whether a user is accessing one of the TOR's hidden services.

They explained, Tor's Guard Gateways could be masqueraded and the packets coming from the user could be made to travel through attacker’s malicious ‘setup’ node acting as an Entry node. In a proof-of-concept attack published this week, the researchers described this technique as "Circuit Fingerprinting,"

It is kind of the behavior biometric which include series of passive attacks that allows spies to unmask the TOR users with almost 80-90 percent accuracy even when without decrypting the tor traffic.

This new alternative approach not only tracks the digital footprints of Tor users but also reveals exactly which hidden service the user was accessing; just by analyzing the traffic data and the pattern of the data packets.

"Tor exhibits fingerprintable traffic patterns that allow an [enemy] to efficiently and accurately identify and correlate circuits involved in the communication with hidden services," says the team.

"Therefore, instead of monitoring every circuit, which may be costly, the first step in the attacker's strategy is to identify suspicious circuits with high confidence to reduce the problem space to just hidden services."

The technique nowhere breaks down the layered encrypted route of Tor network, so being encrypted doesn't make your identity anonymous from others.

The Tor project leader Roger Dingledine raises a question to the researchers asking about genuineness of the accuracy that the Traffic fingerprinting technique delivers, which leaving the researchers and the users confused.

As for the Tor, it is considered to be a popular browser that protects your Anonymity while accessing the Internet. However, with the time and successful breaches, it seems that this phenomenon of the Tor network could get depleted.

According to the MIT News article, the fix was suggested to Tor project representatives, who may add it to a future version of Tor.
source

No comments:

Post a Comment