Different kinds of Tor attacks and how to combat those

Different kinds of Tor related Cyber Attacks and ways to combat those attacks.

  1. BIOS attacks – https://www.youtube.com/watch?v=sNYsfUNegEA
  2. Man in the middle attack – eavesdrop through listening of unencrypted traffic at end nodes of network.  Can be protected by SSL and end-to-end encryption.
  3. Confirmation attack – if both ends cooperate to attack you passing information from you, and then confirming information from the other end through correlation. Tor protects against traffic analysis such as the man-in-the-middle, but cannot protect against traffic confirmation.
  4. Metadata of images that may contain information such as date, time, GPS coordinates when the picture was taken, brand, serialnumber of the device, thumbnails or the original.  Use the Metadata anonymisation toolkit to remove the metadata.
  5. Different tasks must have separate contextual identities by restarting Tails because Tor uses the same circuit relays (allowing to easily identify you)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s