Researchers Unveiled a New, Serious Vulnerability In Tor
Journalists and citizens living under repressive regimes alike depend on the encrypted Tor browser to surf the web anonymously. But in certain cases, an attacker can figure out which dark web site a user is trying to access by passively monitoring Tor traffic, and even reveal the identity of servers hosting sites on the Tor network.
For users, this means that an attacker can see that you’re using Tor to visit WikiLeaks’ hidden service—perhaps you want advice on leaking a sensitive government document—and match it up with your IP address. For hidden service providers, this means that the server hosting WikiLeaks’ site would be revealed to the attacker.
Importantly, the attack doesn’t require the decryption of any traffic—only that it be monitored —and the exploit only requires control of a node where users enter the Tor network. An attacker could even set one of these nodes up herself.