Breaking the Cover - Advanced TOR Deanonymization Techniques and Real-World Attacks
Ekoparty Security Conference via YouTube
Pass the PMP® Exam on Your First Try — Expert-Led Training
Learn Python with Generative AI - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced techniques for deanonymizing TOR networks in this 37-minute conference talk that examines how privacy tools designed for anonymity can be compromised through operational misconfigurations and behavioral patterns. Discover how attackers and researchers successfully deanonymize hidden services by exploiting vulnerabilities that stem not from cryptographic flaws, but from poor configuration practices, protocol-level metadata leaks, and behavioral fingerprinting techniques. Learn through live demonstrations how exposed service headers, hosting errors, and careless isolation decisions can reveal the identities behind onion services. Understand the critical balance between TOR's role as a privacy tool and its misuse by malicious actors for deploying malware infrastructure and hiding illicit content. Gain insights into real-world attack vectors that compromise the onion routing protocol's anonymity guarantees, focusing on practical implementation weaknesses rather than theoretical cryptographic vulnerabilities. Examine case studies of operational security failures that lead to service deanonymization and develop a deeper understanding of the challenges facing anonymous network security in practice.
Syllabus
Breaking the Cover: Advanced TOR Deanonymization Techniques and Real-World Attacks-Francisco Canteli
Taught by
Ekoparty Security Conference