3

Click here to load reader

Tor the target of users online anonymity

Embed Size (px)

Citation preview

Page 1: Tor   the target of users online anonymity

Tor-The Target of User’s Online Anonymity Avkash Kathiriya

Tor – The Target of User’s Online Anonymity?

“TOR”: this is the buzzing word around the security evangelists nowadays, especially after Snowden

revelations.

TOR Introduction: Tor (The Onion Router) was originally designed and implemented by U.S. Naval

research laboratory keeping U.S. navy in mind. Primarily it was designed with the intent of having

anonymity in the government communication. Today, it is used by huge variety of people for various

purposes inheriting anonymity.

But, nowadays integrity of “this” “anonymity” of Tor is under question for several reasons. One of

them is NSA-National Security Agency. Yes, it is said to be under attack by NSA.

It’s being carried out by “SID-Systems Intelligence directorate” which is app vulnerability branch of

NSA. According to NSA presentation shared by Edward Snowden, NSA has developed techniques

exploiting Tor browser bundle. This technique identifies the Tor users on Internet and executes the

exploit against Firefox web browser. This trick is referred as CNE, Computer Network Exploitation.

=================================================================================

Going Step By Step, first step is to identify the Tor users over the internet. This is not the tough task

for NSA at all having partnership with US telecom firms under program codenamed Stormbrew,

Fairview, Oakstar and Blarney.

There are many NSA tools available which has the capability of identifying the Tor users by

monitoring internet. NSA uses the system called “XKeyscore”, a tool which collects information of

Tor users provides with analysis of all the activity of those users.

Doing data analysis for Tor traffic on such an enormous amount of internet traffic is carried out with

the tools codenamed such as Turbulence, Turmoil and Tumult.

Going towards next step, after identifying these Tor users on internet NSA uses some secret internet

servers to redirect these users to another secret internet servers codenamed “FoxAcid”, to infect

their computer. FoxAcid works as a platform between target machine and the attacks developed by

NSA.

Once the target system compromised successfully, it setbacks connection to FoxAcid server where

it’s being targeted for another round of attacks for acquiring long term control over target machine

to send the required information back to NSA.

Though these types of attacks are not actual exploitation of Tor browser but yes it targets the Tor

users.

There are also some hidden systems called Quantum, which tricks target users to visit FoxAcid

servers. These Quantum systems are placed on internet backbone.

Page 2: Tor   the target of users online anonymity

Tor-The Target of User’s Online Anonymity Avkash Kathiriya

Page 3: Tor   the target of users online anonymity

Tor-The Target of User’s Online Anonymity Avkash Kathiriya

Sources:

http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption

http://gizmodo.com/the-nsas-been-trying-to-hack-into-tors-anonymous-inte-1441153819

http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity