Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Was Tor attack linked to withdrawn conference talk?

by The Gurus
July 31, 2014
in Editor's News
Share on FacebookShare on Twitter

There is a connect between attacks on The Onion Router (Tor) project and the withdrawal of a talk at next week’s Black Hat conference.
 
According to Craig Young, security researcher at Tripwire, while the attacker(s) in this case are still technically anonymous, he believed that there is most likely a connection between this incident and the recently withdrawn talk which would have focused on de-anonymising Tor users.
 
He said: “If this was in fact a university research project, it was conducted without appropriate regard to users of the Tor network. This attack involved manipulating Tor protocol messages to encode information about observed requests so that the information could be correlated with an identity by relays in other parts of the network.
 
“In doing so the attackers not only made it possible to themselves unmask some Tor hidden services and users, but they have also created an unquantifiable risk as these messages could also be decoded by other parties either while the attack was in progress or in retrospect by analysing stored packet captures.
 
“Despite the potential negative impacts of this incident, there has also been some good to come.  The fact that the Tor project recognised the new relays used for the attack is good and it has demonstrated that practical attacks against Tor are in fact possible without control over a high percentage of Tor relays. Now the Tor community is able to learn from this experience and improve their detection mechanisms for future Tor anomalies.
 
“Tor protects a lot of people for a lot of different reasons however and even this level of detail would likely be more than enough for an oppressive regime to start hunting down dissidents. If this was in fact the work of Carnegie Mellon University researchers, I would hope that in the future they choose to contribute to security knowledge without jeopardizing public safety.” The talk was cancelled at the request of attorneys for Carnegie Mellon University in Pittsburgh, where the speakers work as researchers.
 
Asked if he felt that the talk and attack were linked, TK Keanini, CTO of Lancope, doubted this saying that despite the bounties placed on comprising Tor, or the endless amounts of threats made to subvert the technology, Tor is evolving and remains a target. “The Tor community is quick to react to incidents and this readiness is important to witness as there is a lot we can learn in how to be resilient despite a hostile and advanced threat,” he said.
 
“The talk from Black Hat that was pulled is operationally insignificant because all the folks actively working on ‘breaking’ Tor are hard at work on their objective; and conferences are not their thing.”

FacebookTweetLinkedIn
Tags: infosec
ShareTweetShare
Previous Post

Attacked Tor may have had users exposed

Next Post

Paddy Power discloses 4 year old data breach

Recent News

Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information