Silk Road forums

Discussion => Security => Topic started by: Tryptamine on December 23, 2011, 06:15 am

Title: Peeling the Onion: Unmasking TOR users
Post by: Tryptamine on December 23, 2011, 06:15 am
http://www.fortconsult.net/images/pdf/tpr_100506.pdf

Thoughts?
Title: Re: Peeling the Onion: Unmasking TOR users
Post by: Variety Jones on December 23, 2011, 02:48 pm
Anyone using TBB or TAILS has nothing to worry about.

The Tor Browser Bundle, actually the TorButton plugin, hooks dangerous javascript, blocks flash and ActiveX objects, and generally doesn't allow executable objects or scripts that could un-mask your IP address.

The remainder of the paper deals with exit nodes using non-encrypted protocols, which everyone should know is a no-no when visiting surface web sites which use exit nodes.

None of that paper applies to the way tor is used here, and it's really written quite poorly as well.
Title: Re: Peeling the Onion: Unmasking TOR users
Post by: CrunchyFrog on December 24, 2011, 04:47 am
Quote from: Tryptamine
http://www.fortconsult.net/images/pdf/tpr_100506.pdf  Thoughts?
1. It's over five years old.  [ fortconsult.net/english/advisories/advisories.php]

Quote from: Peeling the Onion
Several techniques have been tried with success on webtraffic:
· Embedding ActiveX + VBScript to phone home
· Embedding JavaScript in the page
· Embedding a Java “connect-back” applet in the page
· Embedding Flash applets in the page
2. It's one reason why disabling Javascript, Flash and Java -- or simply using TBB -- is highly recommended.