Someone Runs Hundreds Of Bad Servers On The Tor Network

[ad_1]
Recent research suggests that another has been running hundreds of malicious servers on the Tor network, perhaps in an attempt to hide users from anonymously revealing their online activities. As a preliminary report by The Record, the function will appear to be from one source leading and persistent user, who in other words they have the resources to run high-bandwidth server groups for years at the end.
Also known as “Onion router,” Tor is probably a global one well known an online privacy platform, with its programs and compatible networks should protect your online browsing from being hacked by hiding your IP address and encrypting your profile. The network, which was first established in 2002, has met rebellion and bad work in the past, even the most recent developments seem to expose the fraudulent player, less than the average online player.
These malicious servers were first detected by a security analyst who mentions the name “nusenu” and uses their node on the Tor network. Get started Their medium.
Instead, KAX seems to be running large sections of the Tor-network in hopes of being able to follow the paths of other users and unlock them.
Understanding this requires a quick resume how Tor works. Tor detects what users have done online by secretly recording the number of their vehicles and then directing them to various locations – also called “relays” – before it reaches its destination and has no history. Providers of nodes should not see the volume of your traffic, because Tor provides encryption and only supports part of your traffic (also called “circuit”).
However, since the nodes within the Tor network are dedicated-traveling. about users for some reason.
However, in the case of KAX17, the hacker seems to have better tools than you do over the Internet: they have been running hundreds of malicious servers around the world – tasks that are similar to “running multiple torrent network components.” for those events, the chances of a Tor user being tracked by KAX are very high, the researcher indicates.
In fact, according to nusenu’s research, KAX once had more servers – some 900 – so you had a 16 percent chance of using their relay as the first “hop” (ie, node in your area) when entering Tor. You had a 35 percent chance of using one of their connections during your second “hop”, and a 5 percent chance of using them as a way out, you all wrote.
There is also evidence that the attacker participated in the Tor forum discussion, in which he appeared to object to monitoring actions that would have removed their servers from the network.
Despite this, Tor officials have tried to chase the KAX17 on the net several times. Many of the threatened servers were removed by Tor folder administrators in October 2019. Then, last month, administrators removed again. the number of relays which seems dubious and linked to a threatening player. However, in both cases, the player seems to be back and forth, and you are writing.
It is unknown at this time what he will do after leaving the post. “We have no evidence, that they are making threats to confuse the public, but they can,” he said. you are also writing. “The fact that someone is running a very small section of the network … is enough to ring all kinds of bells.”
“Their actions and motives are not clear,” he added.
We reached out to Tor Project to respond to this issue and will change if they respond.
[ad_2]
Source link
