Tag: timing analysis
-
Hacker News: Listen to the whispers: web timing attacks that work
Source URL: https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work Source: Hacker News Title: Listen to the whispers: web timing attacks that work Feedly Summary: Comments AI Summary and Description: Yes **Summary:** This text introduces novel web timing attack techniques capable of breaching server security by exposing hidden vulnerabilities, misconfigurations, and attack surfaces more effectively than previous methods. It emphasizes the practical…
-
Schneier on Security: Law Enforcement Deanonymizes Tor Users
Source URL: https://www.schneier.com/blog/archives/2024/10/law-enforcement-deanonymizes-tor-users.html Source: Schneier on Security Title: Law Enforcement Deanonymizes Tor Users Feedly Summary: The German police have successfully deanonymized at least four Tor users. It appears they watch known Tor relays and known suspects, and use timing analysis to figure out who is using what relay. Tor has written about this. Hacker News…
-
The Register: Tor insists its network is safe after German cops convict CSAM dark-web admin
Source URL: https://www.theregister.com/2024/09/19/tor_police_germany/ Source: The Register Title: Tor insists its network is safe after German cops convict CSAM dark-web admin Feedly Summary: Outdated software blamed for cracks in the armor The Tor project has insisted its privacy-preserving powers remain potent, countering German reports that user anonymity on its network can be and has been compromised…