Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking the Cover - Advanced TOR Deanonymization Techniques and Real-World Attacks

Ekoparty Security Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced techniques for deanonymizing TOR networks in this 37-minute conference talk that examines how privacy tools designed for anonymity can be compromised through operational misconfigurations and behavioral patterns. Discover how attackers and researchers successfully deanonymize hidden services by exploiting vulnerabilities that stem not from cryptographic flaws, but from poor configuration practices, protocol-level metadata leaks, and behavioral fingerprinting techniques. Learn through live demonstrations how exposed service headers, hosting errors, and careless isolation decisions can reveal the identities behind onion services. Understand the critical balance between TOR's role as a privacy tool and its misuse by malicious actors for deploying malware infrastructure and hiding illicit content. Gain insights into real-world attack vectors that compromise the onion routing protocol's anonymity guarantees, focusing on practical implementation weaknesses rather than theoretical cryptographic vulnerabilities. Examine case studies of operational security failures that lead to service deanonymization and develop a deeper understanding of the challenges facing anonymous network security in practice.

Syllabus

Breaking the Cover: Advanced TOR Deanonymization Techniques and Real-World Attacks-Francisco Canteli

Taught by

Ekoparty Security Conference

Reviews

Start your review of Breaking the Cover - Advanced TOR Deanonymization Techniques and Real-World Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.