"Computer scientists have devised an attack on the Tor privacy network
that in certain cases allows them to deanonymize hidden service
websites with 88 percent accuracy.
Such hidden services allow people to host websites without end users
or anyone else knowing the true IP address of the service. The
deanonymization requires the adversary to control the Tor entry point
for the computer hosting the hidden service. It also requires the
attacker to have previously collected unique network characteristics
that can serve as a fingerprint for that particular service. Tor
officials say the requirements reduce the effectiveness of the attack.
Still, the new research underscores the limits to anonymity on Tor,
which journalists, activists, and criminals alike rely on to evade
online surveillance and monitoring."
Dept. of Computer Science
University of Waikato, NZ
+64 (7) 858-5174