[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor DNS Deanonymization

There are many ways for your browser and other network traffic
 to betray your activities; it is not just DNS leaks ya got to be 
 worried about, checkout the browser cache attacks that where 
 shown at the BlackHat convention about two months ago.

Title: I Know Where You've Been: Geo-Inference Attacks...
Link: https://www.youtube.com/watch?v=lGb0AACAk1A

Also be aware that DNS records are not the only way of linking
 specific users (or groups behind the same NAT) of a web
 server or multiple servers over time.

Title : DEF CON 18 - Peter Eckersley - How Unique Is Your Browser?
Link: https://www.youtube.com/watch?v=OwxhAjtgFo8

Stay safe y'all.

On November 2, 2016 10:13:00 AM PDT, sajolida <sajolida@xxxxxxxxxxxx> wrote:
>Alec Muffett:
>> On 14 Oct 2016 1:29 pm, "Justin" <davisjustin002@xxxxxxxxx> wrote:
>>> Not too long ago, a paper was published that talks about how Tor
>>> can be deanonymized through their DNS lookups. Is this something I
>>> be concerned about?
>> That is an excellent question! What are you doing, and who are you
>> of?  :-P
>I bet Justin was referring to [1] which has been announced by its
>authors on tor-dev [2] but I couldn't find an analysis of it by the Tor
>community (and I don't have the skills to do it myself).
>[1]: https://nymity.ch/tor-dns/tor-dns.pdf
>tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
>To unsubscribe or change other settings go to
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to