"Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization" Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf the two seem very similar. in the case of the paper linked amazon services were utilized. or perhaps someone can explain where the two research groups differ? On 03/07/2014 20:05, grarpamp wrote:
You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget Alexander Volynkin / Michael McCord
[...] Looking for the IP address of a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. We know because we tested it, in the wild...
In this talk, we demonstrate how the distributed nature, combined with newly discovered shortcomings in design and implementation of the Tor network, can be abused to break Tor anonymity. In our analysis, we've discovered that a persistent adversary with a handful of powerful servers and a couple gigabit links can de-anonymize hundreds of thousands Tor clients and thousands of hidden services within a couple of months. The total investment cost? Just under $3,000. During this talk, we will quickly cover the nature, feasibility, and limitations of possible attacks, and then dive into dozens of successful real-world de-anonymization case studies, ranging from attribution of botnet command and control servers, to drug-trading sites, to users of kiddie porn places. The presentation will conclude with lessons learned and our thoughts on the future of security of distributed anonymity networks.