#tor

prplcdclnw@diasp.eu

Bad Tor Relays

Tracking down the source for this allegation.

It started with a post from Schneier on his blog. I get this as a news feed. https://www.schneier.com/blog/archives/2021/12/someone-is-running-lots-of-tor-relays.html

Schneier links to this. https://therecord.media/a-mysterious-threat-actor-is-running-hundreds-of-malicious-tor-relays/

That led to Nusenu, and just a little more work led to what I think is the ultimate source.

https://nusenu.medium.com/is-kax17-performing-de-anonymization-attacks-against-tor-users-42e566defce8


Summary
- A mysterious actor which we gave the code-name KAX17 has been running large fractions of the tor network since 2017, despite multiple attempts to remove them from the network during the past years.
- KAX17 has been running relays in all positions of a tor circuit (guard, middle and exit) across many autonomous systems putting them in a position to de-anonymize some tor users.
- Their actions and motives are not well understood.
- We found strong indicators that a KAX17 linked email address got involved in tor-relays mailing list discussions related to fighting malicious relays.
- Detecting and removing malicious tor relays from the network has become an impractical problem to solve.
- We presented a design and proof of concept implementation towards better self-defense options for tor clients to reduce their risk from malicious relays without requiring their detection.
- Most of the tor network’s exit capacity (>50%) supports that design already. More guard relays adopting the proven domain are needed (currently at around 10%).

#tor #tor-relay #tor-relays #privacy #security #surveillance #spying #tor-network #threat-actor #kax17

anonymiss@despora.de

#KAX17 threat actor is attempting to deanonymize #Tor users running thousands of rogue relays

source: https://cybersecurityworldconference.com/2021/12/03/kax17-threat-actor-is-attempting-to-deanonymize-tor-users-running-thousands-of-rogue-relays/

Controlling these relays it is possible to see which website the user connects to and, if an insecure connection is used, it is also possible to manipulate traffic. In May 2020, the threat actor managed to control over 380 Tor exit nodes, with a peak on May 22, when he controlled the 23.95% of Tor exit relay.

Workaround: use only trusted exit nodes! -> https://communitydocs.accessnow.org/147-Tor_force_exit_nodes.html

#Anonymous #anonymity #privacy #darknet #NSA #surveillance #browser #internet #security #hack

eccodrum@joindiaspora.com

A mysterious threat actor is running hundreds of malicious Tor relays

- Security researcher claims to have identified threat actor running thousands of malicious servers.
- Researchers claims the attacker may be trying to deanonymize and identify Tor users.
- Evidence suggests the attacker, tracked as KAX17, is sophisticated and well-resourced.
- The Tor Project has removed hundreds of KAX17 servers in October and November 2021.

Since at least 2017, a mysterious threat actor has run thousands of malicious servers in entry, middle, and exit positions of the Tor network in what a security researcher has described as an attempt to deanonymize Tor users.

full article

#TOR #internet #security #privacy #TheRecord #tech #software #KAX17 #TorProject

d2i@friendica.xyz

Android application for on-line privacy and security.

InviZible Pro. (Open source)
New version 5.5.0

Keeps privacy, prevents tracking, gets access to blocked and hidden on-line resources.

InviZible Pro uses DNSCrypt, Tor and Purple I2P to achieve maximum security, privacy and comfortable use of the Internet.

DNS is used by most applications to translate domain names into IP addresses to find a remote server with the site that you want to visit. But this communication is not encrypted and can be used by attackers. DNSCrypt encrypts and authenticates DNS traffic, thus preventing DNS tracking and spoofing.

Tor encrypts Internet traffic and hides your actual location. It uses thousands of computers around the world to mask your IP address and prevents activity tracking to preserve your privacy and anonymity. Tor also provides access to onion services. These are sites that are in a completely hidden network without censorship.

The Invisible Internet Project (I2P) is a hidden anonymous network. It includes thousands of computers distributed around the world. Purple I2P encrypts the traffic of your device and sends it through these computers to ensure privacy and anonymity. Start I2P to access i2p sites and other Invisible Internet hidden services.

InviZible Pro can use root, if your device has root privileges, or uses a local VPN to deliver Internet traffic to Tor, DNSCrypt and I2P networks.

- InviZible Pro does not support ipv6 at this time.

Features:
* No root required
* Hides location and IP
* Unblocks the restricted web content
* Prevents tracking
* Allows access to hidden networks
* ARP spoofing detection
* Built-in firewall
* Tethering supported
* No analytics
* No advertisements
* Open source
* Material design theme

Premium feature:
* Automatic Updates – Use the latest versions of InviZible Pro, and its modules such as DNSCrypt , Tor, and Purple I2P.
* Absence of reminder about the need to support the project.
* Priority technical advice.
* Material design night theme

What's New
* Updated DNSCrypt to version 2.1.1.
* Added current connection status to the notification.
* Added tiles to Android Quick Settings for starting/stopping modules.
* Optimized application behavior on unstable networks.
* Optimized battery usage when network connection is unavailable.
* Improved websites handling for the Tor Exclude/Select websites feature.

Please visit the project’s page: https://invizible.net/en

Download from Google Play: https://play.google.com/store/apps/details?id=pan.alexander.tordnscrypt.gp

F-droid: https://apt.izzysoft.de/fdroid/index/apk/pan.alexander.tordnscrypt

Take a look at source code: https://github.com/Gedsh/InviZible

#android #internet #vpn #anonymous #privacy #confidentiality #dnscrypt #tor #i2p #vpn #proxy #invizible #inviziblepro

utzer@social.yl.ms

Frage für einen Freund, wo kann man über #Tor eine E-Mailadresse anlegen ohne diese mit irgendwelchen realen Daten verifizieren zu müssen, so das die Adresse vollkommen anonym ist?

prplcdclnw@diasp.eu

New Release: Tor Browser 11.0.1

Tor Browser 11.0.1 is now available from the Tor Browser download page and also from our distribution directory.

This version provides important bug fixes on Windows, MacOS, and Linux, and includes blockchain explorer Blockchair as a search option.

#tor #tor-browser #privacy #surveillance #censorship #security #firefox #firefox-esr #onion-service #onion-services

57b731e9@nerdpol.ch

Portable-Onion-Site Version 1.8 Is Published

This is all you need to create a portable, static, self-hosted, Tor Onion Service Website.

This version just upgrades Tor to version 0.4.6.8.

https://archive.org/details/portable-onion-site

This is a kit, in the form of a signed, but not encrypted, Tar archive that contains all you need to create a portable, static, self-hosted Tor Onion Service website. The webserver is a modified darkhttpd.

Download https://archive.org/download/portable-onion-site/portable-onion-site.gpg and then

  • Drag and drop it onto EasyGPG or
  • In a terminal window, gpg portable-onion-site.gpg, and then unpack the resulting Tar archive named portable-onion-site.

Files

My Public Key https://archive.org/download/portable-onion-site/57b731e9.asc
README https://archive.org/download/portable-onion-site/README
The Whole Package https://archive.org/download/portable-onion-site/portable-onion-site.gpg

#portable-onion-site #tor #onion #website #onion-service #hidden-service #tor-onion-service #tor-hidden-service #censorship #onionland