Skip to main content

Questions tagged [deanonymization]

0 votes
0 answers
239 views

It's been known ever since Tor existed that flow correlation attacks can break Tor's anonymity, but whereas in the past flow correlation attacks had a false positive rate far too high to be useful ...
DeepPSNA's user avatar
1 vote
1 answer
4k views

I was wondering if when you use something like Apple's 'Hide my Email' functionality if there's some way for the organization to still recover the user's original email if the user is then asked to ...
Justin T's user avatar
  • 113
0 votes
2 answers
137 views

Alice and Bob are communicating frequently via an encrypted overlay network. Eve can observe the timing and length of Alice's and Bob's incoming and outgoing ip traffic, but cannot read their ...
Brent's user avatar
  • 105
18 votes
1 answer
22k views

Recently, while using the Tor Browser, NoScript popped up the following warning when I opened a stack overflow link in a new tab from duckduckgo: Potential Identity Leak You are about to load a page ...
nobody's user avatar
  • 11.7k
1 vote
0 answers
209 views

Say someone wants to send a document overseas while living in a hostile country. He uses tor over public wifi. What are some ways he can be tracked if he uses a burner laptop and public wifi? Few ways ...
Thoughtexperiment's user avatar
2 votes
2 answers
924 views

Yesterday, Msgr. Jeffrey Burrill of the U.S Council of Catholic Bishops resigned because an investigation by Pillar, a Catholic newsletter, alleged that he had used Grindr to find hookups. Fairly ...
Benthlin's user avatar
2 votes
0 answers
180 views

I recently heard about the Nym mixnet and am researching it and the Sphinx packet format. So far it looks promising, but there is one thing I'm unsure of. Networks like Tor use ephemeral keys to limit ...
CrystalShared's user avatar
0 votes
1 answer
2k views

Here's the article from the Belarusian website http://dev.by, it is an interview with a former member of dictator Lukashenko band (so-called Chief Organized Crime and Corruption Fighting Directorate). ...
Gino Pane's user avatar
  • 101
1 vote
1 answer
275 views

If I connect to a VPN, go to some websites, post something or browse something, is it possible for my OS (Windows 10) in this case to: Store my IP before I connected to the VPN, say "old IP"...
Colton Scottie's user avatar
2 votes
1 answer
876 views

I am trying to figure out what is the best way to hide Tor traffic in order to improve anonymity. While Tor is pretty good at hiding users’ IP addresses, its traffic stands out. This can be ...
Gregoire42's user avatar
1 vote
1 answer
2k views

In a Telegram public channel, all messages are public, send by the channel creators and contain a timestamp. Suppose I am an ISP. Can I analyse the traffic of all my clients and decide if they are ...
user241830's user avatar
9 votes
2 answers
3k views

The FBI recently used a 0day exploit to hack a TAILS user and expose their real IP. I am interested in how they could have managed to obtain the user's real public IP after compromising the machine. ...
nobody's user avatar
  • 11.7k
7 votes
2 answers
1k views

https://people.cs.umass.edu/~amir/papers/CCS18-DeepCorr.pdf https://www.youtube.com/watch?v=_OKLtKgEn4k I have some questions about this "Deepcorr". Does "DeepCorr" really work that good? They say ...
Eleanor's user avatar
  • 191
0 votes
1 answer
2k views

Tor traffic correlation attacks by global adversaries I know what traffic correlation attack is but I find it hard to understand this article or how it got to its conclusions about 'de-anonymize' '...
randoman's user avatar
86 votes
5 answers
19k views

In every TV program where there's a person that wants to remain anonymous, they change their voice in a way that to me sounds like a simple increase or decrease in pitch (frequencies). What I'm ...
reed's user avatar
  • 16k

15 30 50 per page