Sources: How you can be deanonymized through Tor
These are the Sources for our article on being deanonymized through Tor.

Read complete article here
These are the sources for our article on being deanonymized through Tor.
Sources Below:
[1]
Tech Times
FBI Drops Child Pornography Case To Avoid Disclosing Tor Vulnerability
Alexandra Burlacu
07 March 2017
https://www.techtimes.com/articles/200592/20170307/fbi-drops-child-pornography-case-to-avoid-disclosing-tor-vulnerability.htm
[2]
RestorePrivacy
Is Tor Trustworthy and Safe?
Sven Taylor
December 14, 2021
https://restoreprivacy.com/tor/
[3]
Black Hat anti-Tor talk smashed by lawyers’ wrecking ball
Darren Pauli
22 Jul 2014
https://www.theregister.com/2014/07/22/legal_wrecking_balls_break_budget_tor_popping_talk/
JavaScript Attacks
[4a]
Hacker News
Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched
By Ravie Lakshmanan
May 26, 2022
https://thehackernews.com/2022/05/tails-os-users-advised-not-to-use-tor.html
[4b]
Pwn2Own Vancouver 2022
The Results
By Dustin Childs
May 18, 2022
https://www.zerodayinitiative.com/blog/2022/5/18/pwn2own-vancouver-2022-the-results
[5]
Zd Net
Tor Browser 8.5.2 release patches critical Firefox vulnerability exploited in the wild
Charlie Osborne
June 20, 2019
https://www.zdnet.com/article/tor-browser-8-5-2-release-patches-firefox-flaw-being-exploited-in-the-wild/
[6]
HackRead
Tor Browser Impacted by Firefox’s Zero-day Vulnerability
Uzair Amir
December 1, 2016
https://www.hackread.com/tor-browser-firefoxs-zero-day-vulnerability/
[7a]
Jose Carlos Norte
Advanced Tor Browser Fingerprinting
March 6th, 2016
http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html
[7b]
HackRead
Mouse movements are enough to track down Tor users
(and CPU intensive JavaScript)
Uzair Amir
March 15, 2016
https://www.hackread.com/tracking-tor-users-with-mouse-movements/
[8]
ArsTechnica
Attackers wield Firefox exploit to uncloak anonymous Tor users
Dan Goodin
Aug 5, 2013
https://arstechnica.com/information-technology/2013/08/attackers-wield-firefox-exploit-to-uncloak-anonymous-tor-users/
Malicious Exit Nodes
[9]
The Record
Thousands of Tor exit nodes attacked cryptocurrency users over the past year
Catalin Cimpanu, May 9, 2021
https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year/
[10]
Official Tor Project
Tor security advisory: exit relays running sslstrip in May and June 2020
By isabela, August 14, 2020
https://blog.torproject.org/bad-exit-relays-may-june-2020/
[11]
Zd Net
A mysterious group has hijacked Tor exit nodes to perform SSL stripping attacks
Written by Catalin Cimpanu
https://www.zdnet.com/article/a-mysterious-group-has-hijacked-tor-exit-nodes-to-perform-ssl-stripping-attacks/
[12]
Security Week
Malicious Actor Controlled 23% of Tor Exit Nodes
By Ionut Arghire, August 11, 2020
https://www.securityweek.com/malicious-actor-controlled-23-tor-exit-nodes
[13]
Karlstad University
Spoiled Onions: Exposing Malicious Tor Exit Relays
Philipp Winter, Stefan Lindskog
https://www.cs.kau.se/philwint/spoiled_onions/techreport.pdf
[14]
Computer World
6 Ways to Stay Safe From Compromised Tor Exit Nodes
By Gavin Phillips, May 09, 2019
https://www.computerworld.com/article/2486774/tor-exit-nodes-attempt-to-spy-on-encrypted-traffic–researchers-find.html
Malicious Middle Relays
[15]
Noir Dot News
Hundreds of Malicious Tor Relays Detected
By Dr. Dang, March 22, 2022
https://www.noirdotnews.com/news/hundreds-of-malicious-tor-relays-detected/
on KAX17
[16]
Bruce Schneier
Someone Is Running Lots of Tor Relays
Bruce Schneier, Dec 7, 2021
https://www.schneier.com/blog/archives/2021/12/someone-is-running-lots-of-tor-relays.html
Malicious Entry Guards
[17]
ArsTechnica
New attack on Tor can deanonymize hidden services with surprising accuracy
Dan Goodin
July 31, 2015
https://arstechnica.com/information-technology/2015/07/new-attack-on-tor-can-deanonymize-hidden-services-with-surprising-accuracy/
[18]
Massachusetts Institute of Technology and Qatar Computing Research Institute
Shoring up Tor
Researchers mount successful attacks against popular anonymity network — and show how to prevent them.
Larry Hardesty
July 28, 2015
https://news.mit.edu/2015/tor-vulnerability-0729
Cross Device Tracking
[19]
Bleeping Computer
Ultrasound Tracking Could Be Used to Deanonymize Tor Users
By Catalin Cimpanu, January 3, 2017
https://www.bleepingcomputer.com/news/security/ultrasound-tracking-could-be-used-to-deanonymize-tor-users/
[20]
University of California
Santa Barbara Cybersecurity @ BlackHat Conference
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking
Vasilios Mavroudis, Doctoral Researcher UCL
Federico Maggi, Researcher UCSB
Christopher Kruegel, UCSB
Full PDF of the Paper:
https://www.blackhat.com/docs/eu-16/materials/eu-16-Mavroudis-Talking-Behind-Your-Back-Attacks-And-Countermeasures-Of-Ultrasonic-Cross-Device-Tracking.pdf
BlackHat Conference: USBC Presents Cybersecurity Research of the Paper
Jan 8, 2020
Invidious Mirror to Avoid Youtube:
https://invidious.sethforprivacy.com/watch?v=THFOnA6m8KM
Other
BoingBoing
Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites
Cory Doctorow
Fri Jul 1, 2016
https://boingboing.net/2016/07/01/researchers-find-over-10###0-spyi.html
Patrick Gray
(14 years old but still relevant)
The hack of the year
November 13, 2007
https://www.smh.com.au/technology/the-hack-of-the-year-20071113-gdrkxw.html
Wired
WikiLeaks Was Launched With Documents Intercepted From Tor
Kim Zetter
Jun 1, 2010
https://www.wired.com/2010/06/wikileaks-documents/
https://cdn-resprivacy.pressidium.com/wp-content/uploads/2019/02/10_honions-sanatinia.pdf
SC Magazine UK
Tor network exit nodes found to be sniffing passing traffic
Jul 01, 2015
Tom Reeve
https://web.archive.org/web/20190807043523/
&
https://www.scmagazineuk.com/tor-network-exit-nodes-found-sniffing-passing-traffic/article/1479106
HackerNews
Over 25% Of Tor Exit Relays Spied On Users’ Dark Web Activities
May 10, 2021
Ravie Lakshmanan
https://thehackernews.com/2021/05/over-25-of-tor-exit-relays-are-spying.html
BitDefender
Threat Actor Compromised More than 25 Percent of Tor Network Relays, Research Shows
Silviu STAHIE
May 11, 2021
https://www.bitdefender.com/blog/hotforsecurity/threat-actor-compromised-more-than-25-percent-of-tor-network-relays-research-shows
If you really want to learn and take your privacy to the next level, subscribe to our new content via: Nostr, Bastyon, Session, RSS, Ethereum Push
Related Posts

Sources: Why KVM Whonix over Oracle VirtualBox
references to our article on KVM Whonix over Oracle Virtual box
[SP]
Feb 1, 2024

Sources: Why is Google bad for your business?
These are the Sources for our article on Google is bad for business
[SP]
Jan 28, 2024

Sources: Elizabeth Warren says “Ban Bitcoin” but it’s Israel that funded Hamas
[ADMIN]
Dec 16, 2023

California AI bill FORCES social media digital ID
California just PASSED legislation that requires a Digital ID to view social media
[SP]
Aug 20, 2023