Type above and press Enter to search. Press Esc to cancel.

Loading...
Close Menu
  • Biology
  • Chemistry
  • Earth
  • Health
  • Physics
  • Science
  • Space
  • Technology
Facebook X (Twitter) Instagram

Quantumis

  • Biology
  • Chemistry
  • Earth
  • Health
  • Physics
  • Science
  • Space
  • Technology
Facebook X (Twitter) Pinterest YouTube
Quantumis
Home » » Tor anonymity infiltrated: Law enforcement monitors servers successfully

Tor anonymity infiltrated: Law enforcement monitors servers successfully

Facebook Twitter Pinterest Telegram LinkedIn WhatsApp Email Reddit
Share
Facebook Twitter LinkedIn Pinterest Telegram Email Reddit

Tor is an important service on the Internet when it comes to anonymity. It is free and can be used by anyone to hide information such as a device's public IP address.

Tor is used by people from all over the world to overcome censorship. While it is used for good, it is abused as well. Cybercriminals are using Tor for the very same purpose: to stay anonymous and evade law enforcement.

Also of interest: Tor launched WebTunnel Bridge recently as a new way to overcome censorship

Anonymity cracks

Law enforcement agencies in Germany have monitored Tor servers for months to identify individual users. The agencies managed to identify a server of the ransomware group Vanir Locker that the group operated from within the Tor network.

The group announced that it would release copied data from one of its latest coups on the server. Law enforcement agents managed to identify the location of the server by using a technique that is called Timing Analysis.

Timing Analysis is used to link connections to nodes in the Tor network to local Internet connections. The method depends on the monitoring of as many Tor nodes as possible, as this increases the chance of identification.

This confirms that law enforcement is monitoring Tor nodes. It seems likely that German law enforcement agencies are not the only ones using the technique for identification.

A state office of criminal investigations took over the Tor address of the ransomware group and redirected it to a new page. This prevented the release of the stolen data on the page.

Reporters from ARD, a publicly financed broadcasters, were able to view documents that confirmed four successful identifications in a single investigation, according to reports. Agencies used the technique to identify members of a child abuse platform.

Closing Words

It is not only law enforcement agencies that may use the technique to identify criminals. Oppressive regimes may use the very same method to identify users who try to stay anonymous to evade prosecution.

A blog post on the Tor Project blog sheds some light on the issue. It addresses the identification in the child abuse case. The maintainers admit that they did not have access to sources, but believe that Tor continues to be one of the best options to stay anonymous for the majority of Internet users.

They would like to receive access to the information to find out if there is an issue with the service that may be fixed.

What is your take on this? Do you use Tor at all? Feel free to write a comment down below.

Share. Facebook Twitter Pinterest LinkedIn Email Reddit

Related Articles

Firefox Nightly: Mozilla makes it easier to test vertical tabs

Exclusive: Microsoft announces release date of the Windows 11 24H2 feature update

Tor anonymity infiltrated: Law enforcement monitors servers successfully

Keyzing: a reference when buying software online

Windows Recall: Microsoft's second launch attempt after devastating criticism

Overwhelmed by Your Inbox? Here’s How to Reclaim Control

iVerify: Pegasus spyware infections may be much higher than previously thought

How to restore the full date and time format on Windows 11's taskbar

ChatGPT Search is now available for free users

Google Chrome 132 update fixes 16 unique security issues

Comment

Leave A Reply Cancel Reply

Trending News

The end of Patreon? Google is implementing micro-payments into Chrome

Vivaldi introduces Tab Renaming, drag-and-drop management for downloads, and more

Here is why App Updates from Google Play may feel like they install faster now

Tor anonymity infiltrated: Law enforcement monitors servers successfully

Kaspersky users in the US say their antivirus was replaced by UltraAV

Print AI: HP injects AI into its printers

Windows 11 24H2: Cleanup is no longer deleting all temporary files

Google Chrome: removal of uBlock Origin and other unsupported extensions has started

UnattendedWinstall: open source tool bypasses Windows installation restrictions and removes bloatware

Here's a closer look at Rewrite AI in Notepad

Follow Quantumis
  • Facebook
  • Twitter
  • YouTube
  • Pinterest
SciTech News
  • Biology News
  • Chemistry News
  • Earth News
  • Health News
  • Physics News
  • Science News
  • Space News
  • Technology News
Recent Posts
  • Microsoft is deprecating Legacy DRM services - these clients are affected
  • Understanding Data Loss Risks—and How to Prevent It
  • Microsoft releases the November 2024 security updates for Windows
  • Apple releases iCloud Passwords extension for Firefox, but only for macOS Sonoma
  • Microsoft confirms it will not lower Windows 11 system requirements
  • Google Chrome 132 update fixes 16 unique security issues
Copyright © 2025 Quantumis. All Rights Reserved.
  • About
  • Contact
  • Privacy Policy
  • Terms of Use