Author

Topic: [2014-08-01] Tor Confirms Attack May Have Deanonymized Users (Read 870 times)

legendary
Activity: 2114
Merit: 1040
A Great Time to Start Something!
Well they say the latest release will have improved node management, and that should also increase security on the exit nodes.

I still do not trust a "Honey Pot" like that. You just put the spotlight on you, when you use it.  Sad

I never trusted Tor, it seems way too good to be true.
legendary
Activity: 1904
Merit: 1074
Well they say the latest release will have improved node management, and that should also increase security on the exit nodes.

I still do not trust a "Honey Pot" like that. You just put the spotlight on you, when you use it.  Sad
legendary
Activity: 1400
Merit: 1013
If you would rather use an alternative, look into I2P. I2P is another privacy tool that constantly switches nodes in order to decrease the likelihood of a successful attack. It also works within the internet rather than separate from it and doesn't rely on a centralized address database like Tor does, which seems to fit more within the Bitcoin ethos.
Tor is an anonymous proxy network, that implements hidden services as an afterthought.

I2P is a hidden service network, that implements outproxies as an afterthought.
legendary
Activity: 2884
Merit: 1115
Leading Crypto Sports Betting & Casino Platform
Only fully decentralised software and networks will keep you anonymous anything that passes through somebodies server can be hacked or taken out.

This the main risk with Tor is in the exit node where the information comes out
Inside its clear more or less

In a July 30 blog post, Tor confirmed that several entry nodes may have been run by a nefarious party attempting to identify Tor users, and they appear to have been successful.

That said it makes sense that some malicious entity would control the node to try and access data its a problem that needs to be solved.
Although some of the proposals some altcoins have to address it could be applied to this and make things more interesting.
sr. member
Activity: 518
Merit: 250
Only fully decentralised software and networks will keep you anonymous anything that passes through somebodies server can be hacked or taken out.

Right, using a decentralized network there would be some more chance of anonymity. I think it's possible to create protocols in which the users are completely anonymous - given that there are enough nodes on the network.
legendary
Activity: 1540
Merit: 1000
Only fully decentralised software and networks will keep you anonymous anything that passes through somebodies server can be hacked or taken out.
legendary
Activity: 1904
Merit: 1074
http://cointelegraph.com/news/112192/tor-confirms-attack-may-have-deanonymized-users

Tor recommends that users upgrade to the newest version of the Tor browser, which should increase security. If you would rather use an alternative, look into I2P. I2P is another privacy tool that constantly switches nodes in order to decrease the likelihood of a successful attack. It also works within the internet rather than separate from it and doesn't rely on a centralized address database like Tor does, which seems to fit more within the Bitcoin ethos.

You think this will be the answer to your privacy needs?
Jump to: