Version Tomorrow is the first day of the rest of your life
lecture: Tor de-anonymization techniques
How people have lost their anonymity? Let's study real-world cases and try to learn how to avoid these errors.
Tor offers great anonymity and privacy for millions of people. However, there are some Tor de-anonymization techniques that work. This presentation demonstrates de-anonymization of Tor hidden services and users.
Tor offers censorship-resistant and distributed platform that can provide easy-to-implement anonymity to web users, websites and other web services. Tor enables web servers to hide their location and Tor users can connect to these authenticated hidden services while the server and the user both stay anonymous.
However, throughout the years of Tor existence some users lost their anonymity. Let's look the technical limitations of anonymity and operational security challenges that Tor user will encounter. Also, hands-on demonstration of anonymity exposures on leverage of traffic correlation attacks, electronic fingerprinting, and some Tor specific configuration failures.