Messenger Kids app: Error expose underage children!
business infosec

Messenger Kids app: Error expose underage children!

About two years ago, Facebook after constant demand from users for secure children's communication through ...
Read More

Cloud-based hosting provider iNSYNQ fell victim to ransomware

Last Tuesday, iNSYNQ, which offers virtual desktop environments, fell victim to ransomware, causing it to shut down ....
Read More

Malicious framework generates 1 million ads

Flashpoint researchers have discovered a great advertising framework that is parasitic of Google AdSense ads. Researchers have said that ...
Read More

Equifax: 650 fine for million-dollar hacking for 2017

Equifax is going to pay a huge fine (about 650 million dollars) for the 2017 data breach incident ....
Read More

VLC Media Player: Vulnerability allows hackers to run code

Critical vulnerability was discovered in the current version of VLC Media Player. This flaw allows hackers to execute code in ...
Read More
Latest Posts

The Tor network does not offer complete anonymity to Dark Web users

TorIn recent years, more and more people are using the Dark Web. The increase in popularity is mainly due to the fact that anonymity and privacy are offered to users. If someone wants to access the Dark Web, they can use Onion Routing (TOR). This is an anonymous network. However, while users may think that their network is fully covered, there is a new one research, which argues that there is no complete anonymity in the Tor network when someone enters the Dark Web.

However, there are some limitations on this research. Initially, the results came from two dark web search engines: Onion City and Ahimia. The second restriction concerns the fact that researchers considered Tor users as a representative sample of dark web users. They ignored other anonymous ones networkssuch as Freenet and I2P.

Anonymity in the Dark Web

Networks, such as the TOR, are trying to give anonymity to users so that their online activities are not perceived. On the other hand, experts are trying to develop tools that aim at identifying and identifying individuals or services. In short, they try to "break" anonymity.

2013, the FBI took control of Freedom Host, a Tor web hosting service and infected it with a malicious software, which was created to identify visitors to the service.

Virtually this malicious software was used as an "address verifier" in Freedom Hosting. With this program, the FBI was able to identify people involved in suspicious activities. They could also locate their location using a proxy server or anonymous services such as TOR.

How to identify Tor network users?

Researchers used directory requests to estimate the number of Tor users. Directory requests "disassemble" IP addresses according to country codes.

The editors identified IP addresses via ISPs that identify Tor network connections via an up-to-date Tor relay list.

In addition, a number is given in the directory requests. These numbers, together, indirectly represent the number of Dark Web users.

If you would like to know more about this research, click here.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *