Skip to main content

Questions tagged [deanonymization]

The tag has no usage guidance.

0 votes
0 answers
171 views

Impact of Deep Learning Based Flow Correlation on Tor

It's been known ever since Tor existed that flow correlation attacks can break Tor's anonymity, but whereas in the past flow correlation attacks had a false positive rate far too high to be useful ...
DeepPSNA's user avatar
1 vote
1 answer
2k views

Does Apple’s Hide my Email feature really work?

I was wondering if when you use something like Apple's 'Hide my Email' functionality if there's some way for the organization to still recover the user's original email if the user is then asked to ...
Justin T's user avatar
  • 113
0 votes
2 answers
98 views

What is using timing and cryptotext length for deanonymization called?

Alice and Bob are communicating frequently via an encrypted overlay network. Eve can observe the timing and length of Alice's and Bob's incoming and outgoing ip traffic, but cannot read their ...
Brent's user avatar
  • 105
18 votes
1 answer
21k views

What is this potential identity leak that NoScript warns about?

Recently, while using the Tor Browser, NoScript popped up the following warning when I opened a stack overflow link in a new tab from duckduckgo: Potential Identity Leak You are about to load a page ...
nobody's user avatar
  • 11.6k
1 vote
0 answers
171 views

How can someone using public wifi be deanonymized?

Say someone wants to send a document overseas while living in a hostile country. He uses tor over public wifi. What are some ways he can be tracked if he uses a burner laptop and public wifi? Few ways ...
Thoughtexperiment's user avatar
2 votes
2 answers
687 views

Feasability of deanonymizing commercially available advertiser data

Yesterday, Msgr. Jeffrey Burrill of the U.S Council of Catholic Bishops resigned because an investigation by Pillar, a Catholic newsletter, alleged that he had used Grindr to find hookups. Fairly ...
Benthlin's user avatar
1 vote
0 answers
144 views

Nym Perfect Forward Secrecy

I recently heard about the Nym mixnet and am researching it and the Sphinx packet format. So far it looks promising, but there is one thing I'm unsure of. Networks like Tor use ephemeral keys to limit ...
CrystalShared's user avatar
0 votes
1 answer
2k views

Is it possible to detect a Telegram user by sniffing traffic?

Here's the article from the Belarusian website http://dev.by, it is an interview with a former member of dictator Lukashenko band (so-called Chief Organized Crime and Corruption Fighting Directorate). ...
Gino Pane's user avatar
  • 101
0 votes
1 answer
236 views

Could an OS or app store and send my old IP after I start using a VPN?

If I connect to a VPN, go to some websites, post something or browse something, is it possible for my OS (Windows 10) in this case to: Store my IP before I connected to the VPN, say "old IP"...
Colton Scottie's user avatar
2 votes
1 answer
665 views

Hiding Tor traffic to prevent deanonymization

I am trying to figure out what is the best way to hide Tor traffic in order to improve anonymity. While Tor is pretty good at hiding users’ IP addresses, its traffic stands out. This can be ...
Gregoire42's user avatar
1 vote
1 answer
2k views

Can ISP deanonymize Telegram public channel creators?

In a Telegram public channel, all messages are public, send by the channel creators and contain a timestamp. Suppose I am an ISP. Can I analyse the traffic of all my clients and decide if they are ...
user241830's user avatar
9 votes
2 answers
2k views

How can malware discover the real IP of a TAILS user?

The FBI recently used a 0day exploit to hack a TAILS user and expose their real IP. I am interested in how they could have managed to obtain the user's real public IP after compromising the machine. ...
nobody's user avatar
  • 11.6k
7 votes
2 answers
1k views

Can DeepCorr's correlation technique de-anonymize all Tor users?

https://people.cs.umass.edu/~amir/papers/CCS18-DeepCorr.pdf https://www.youtube.com/watch?v=_OKLtKgEn4k I have some questions about this "Deepcorr". Does "DeepCorr" really work that good? They say ...
Eleanor's user avatar
  • 91
0 votes
1 answer
1k views

Can global adversaries 'de-anonymize' any Tor user in a day?

Tor traffic correlation attacks by global adversaries I know what traffic correlation attack is but I find it hard to understand this article or how it got to its conclusions about 'de-anonymize' '...
randoman's user avatar
85 votes
5 answers
19k views

Is changing pitch enough for anonymizing a person's voice?

In every TV program where there's a person that wants to remain anonymous, they change their voice in a way that to me sounds like a simple increase or decrease in pitch (frequencies). What I'm ...
reed's user avatar
  • 15.8k

15 30 50 per page