Bitcoin Forum
May 28, 2024, 05:57:53 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [2014-08-01] Tor Confirms Attack May Have Deanonymized Users  (Read 839 times)
Kprawn (OP)
Legendary
*
Offline Offline

Activity: 1904
Merit: 1073


View Profile
August 01, 2014, 05:16:43 PM
 #1

http://cointelegraph.com/news/112192/tor-confirms-attack-may-have-deanonymized-users

Tor recommends that users upgrade to the newest version of the Tor browser, which should increase security. If you would rather use an alternative, look into I2P. I2P is another privacy tool that constantly switches nodes in order to decrease the likelihood of a successful attack. It also works within the internet rather than separate from it and doesn't rely on a centralized address database like Tor does, which seems to fit more within the Bitcoin ethos.

You think this will be the answer to your privacy needs?

THE FIRST DECENTRALIZED & PLAYER-OWNED CASINO
.EARNBET..EARN BITCOIN: DIVIDENDS
FOR-LIFETIME & MUCH MORE.
. BET WITH: BTCETHEOSLTCBCHWAXXRPBNB
.JOIN US: GITLABTWITTERTELEGRAM
Lethn
Legendary
*
Offline Offline

Activity: 1540
Merit: 1000



View Profile WWW
August 01, 2014, 10:29:18 PM
Last edit: August 01, 2014, 11:12:41 PM by Lethn
 #2

Only fully decentralised software and networks will keep you anonymous anything that passes through somebodies server can be hacked or taken out.
bitsmichel
Sr. Member
****
Offline Offline

Activity: 518
Merit: 250



View Profile
August 02, 2014, 12:23:47 AM
 #3

Only fully decentralised software and networks will keep you anonymous anything that passes through somebodies server can be hacked or taken out.

Right, using a decentralized network there would be some more chance of anonymity. I think it's possible to create protocols in which the users are completely anonymous - given that there are enough nodes on the network.

Swordsoffreedom
Legendary
*
Online Online

Activity: 2772
Merit: 1115


Leading Crypto Sports Betting & Casino Platform


View Profile WWW
August 02, 2014, 01:35:43 AM
 #4

Only fully decentralised software and networks will keep you anonymous anything that passes through somebodies server can be hacked or taken out.

This the main risk with Tor is in the exit node where the information comes out
Inside its clear more or less

In a July 30 blog post, Tor confirmed that several entry nodes may have been run by a nefarious party attempting to identify Tor users, and they appear to have been successful.

That said it makes sense that some malicious entity would control the node to try and access data its a problem that needs to be solved.
Although some of the proposals some altcoins have to address it could be applied to this and make things more interesting.

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
August 02, 2014, 01:39:04 AM
 #5

If you would rather use an alternative, look into I2P. I2P is another privacy tool that constantly switches nodes in order to decrease the likelihood of a successful attack. It also works within the internet rather than separate from it and doesn't rely on a centralized address database like Tor does, which seems to fit more within the Bitcoin ethos.
Tor is an anonymous proxy network, that implements hidden services as an afterthought.

I2P is a hidden service network, that implements outproxies as an afterthought.
Kprawn (OP)
Legendary
*
Offline Offline

Activity: 1904
Merit: 1073


View Profile
August 02, 2014, 08:44:55 AM
 #6

Well they say the latest release will have improved node management, and that should also increase security on the exit nodes.

I still do not trust a "Honey Pot" like that. You just put the spotlight on you, when you use it.  Sad

THE FIRST DECENTRALIZED & PLAYER-OWNED CASINO
.EARNBET..EARN BITCOIN: DIVIDENDS
FOR-LIFETIME & MUCH MORE.
. BET WITH: BTCETHEOSLTCBCHWAXXRPBNB
.JOIN US: GITLABTWITTERTELEGRAM
Bit_Happy
Legendary
*
Offline Offline

Activity: 2114
Merit: 1040


A Great Time to Start Something!


View Profile
August 02, 2014, 05:59:50 PM
 #7

Well they say the latest release will have improved node management, and that should also increase security on the exit nodes.

I still do not trust a "Honey Pot" like that. You just put the spotlight on you, when you use it.  Sad

I never trusted Tor, it seems way too good to be true.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!