Breaking the Cover - Advanced TOR Deanonymization Techniques and Real-World Attacks
Ekoparty Security Conference via YouTube
Gain a Splash of New Skills - Coursera+ Annual Just ₹7,999
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced techniques for deanonymizing TOR networks in this 37-minute conference talk that examines how privacy tools designed for anonymity can be compromised through operational misconfigurations and behavioral patterns. Discover how attackers and researchers successfully deanonymize hidden services by exploiting vulnerabilities that stem not from cryptographic flaws, but from poor configuration practices, protocol-level metadata leaks, and behavioral fingerprinting techniques. Learn through live demonstrations how exposed service headers, hosting errors, and careless isolation decisions can reveal the identities behind onion services. Understand the critical balance between TOR's role as a privacy tool and its misuse by malicious actors for deploying malware infrastructure and hiding illicit content. Gain insights into real-world attack vectors that compromise the onion routing protocol's anonymity guarantees, focusing on practical implementation weaknesses rather than theoretical cryptographic vulnerabilities. Examine case studies of operational security failures that lead to service deanonymization and develop a deeper understanding of the challenges facing anonymous network security in practice.
Syllabus
Breaking the Cover: Advanced TOR Deanonymization Techniques and Real-World Attacks-Francisco Canteli
Taught by
Ekoparty Security Conference