Identifying Tor Users Through Insecure Applications

Discussion in 'privacy technology' started by lotuseclat79, Mar 25, 2011.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Identifying Tor Users Through Insecure Applications.

    -- Tom
     
  2. I no more

    I no more Registered Member

    Joined:
    Sep 18, 2009
    Posts:
    358
    Very interesting attack. :thumb:

    I'll admit that when I torrent, I also access the tracker through Tor and download the content outside of Tor. This is the only application where I have access partially through Tor and partially outside of Tor.

    I'm not sure that I care all that much if someone can track my torrent downloads, but the "bad apple" attack also allows my browser usage to be tracked during this period. :thumbd:

    I wonder what the Tor developers have to say and if they have a fix in mind.
     
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    That was my first thought about the article! I subscribe to the Tor Blog blogs RSS feed, and recently they did post some reading links, so, when they have something to say about it, I suppose the blog rss feed will let me know.

    Reading to the end, the Tor Project lead, Roger Dingledine, is listed in the acknowledgments. Ergo, The Tor Project collaborated in the study.

    -- Tom
     
    Last edited: Mar 25, 2011
  4. markedmanner

    markedmanner Registered Member

    Joined:
    Nov 1, 2009
    Posts:
    134
    Is this something that JanusVm would take care of?
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.