Tor anonymity infiltrated: Law enforcement monitors servers successfully
Tor is an important service on the Internet when it comes to anonymity. It is free and can be used by anyone to hide information such as a device's public IP address.
Tor is used by people from all over the world to overcome censorship. While it is used for good, it is abused as well. Cybercriminals are using Tor for the very same purpose: to stay anonymous and evade law enforcement.
Also of interest: Tor launched WebTunnel Bridge recently as a new way to overcome censorship
Anonymity cracks
Law enforcement agencies in Germany have monitored Tor servers for months to identify individual users. The agencies managed to identify a server of the ransomware group Vanir Locker that the group operated from within the Tor network.
The group announced that it would release copied data from one of its latest coups on the server. Law enforcement agents managed to identify the location of the server by using a technique that is called Timing Analysis.
Timing Analysis is used to link connections to nodes in the Tor network to local Internet connections. The method depends on the monitoring of as many Tor nodes as possible, as this increases the chance of identification.
This confirms that law enforcement is monitoring Tor nodes. It seems likely that German law enforcement agencies are not the only ones using the technique for identification.
A state office of criminal investigations took over the Tor address of the ransomware group and redirected it to a new page. This prevented the release of the stolen data on the page.
Reporters from ARD, a publicly financed broadcasters, were able to view documents that confirmed four successful identifications in a single investigation, according to reports. Agencies used the technique to identify members of a child abuse platform.
Closing Words
It is not only law enforcement agencies that may use the technique to identify criminals. Oppressive regimes may use the very same method to identify users who try to stay anonymous to evade prosecution.
A blog post on the Tor Project blog sheds some light on the issue. It addresses the identification in the child abuse case. The maintainers admit that they did not have access to sources, but believe that Tor continues to be one of the best options to stay anonymous for the majority of Internet users.
They would like to receive access to the information to find out if there is an issue with the service that may be fixed.
What is your take on this? Do you use Tor at all? Feel free to write a comment down below.
RECOMMENDED NEWS
DeepSeek AI Exposed User Data and Chat Histories
According to cloud security firm Wiz, DeepSeek has secured an open database that exposed sensitive ...
Google Tests New AI Mode in Search for Enhanced User Experience
Google is experimenting with a new "AI Mode" in its Search platform, aiming to integrate conversati...
Sony Addresses Major PSN Outage with Compensation, But Gamers Remain Unhappy
Sony's PlayStation Network (PSN) recently experienced a significant outage lasting approximately 24...
New AI Trust score reveals DeepSeek leads in sensitive information disclosure
Recent evaluations reveal that Chinese AI models, particularly DeepSeek, are outperforming their Am...
Google Enhances Gemini AI with Canvas for Coding and AI-Generated Audio Overviews
Google has introduced two major updates to its Gemini AI assistant: Canvas and Audio Overview, expa...
FTC v. Meta antitrust trial: Meta says it is not a monopoly
The antitrust trial between the U.S. Federal Trade Commission and Meta has begun. And Facebook's pa...
Comments on "Tor anonymity infiltrated: Law enforcement monitors servers successfully" :