DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!

   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
November 14, 2018 
Main Menu
Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 154 people online.

 

Latest Reviews
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
Lamptron FC-10 SE fan controller
 

Follow us
RSS
 

Tor weakness could identify server locations

Posted on Thursday, August 27 2015 @ 12:05:32 CEST by


logo
Agora, a dark market website that uses the Tor network, has temporarily closed its doors amidst fears that a vulnerability can help attackers to identify server locations. The website claims it noticed "suspicious activity" around their servers, which urged them to shut down and move the server to another location out of safety precautions. Full details at ARS Technica.
"We have recently been discovering suspicious activity around our servers which led us to believe that some of the attacks described in the research could be going on and we decided to move servers once again," operators of Agora, a hidden service that markets everything from illicit drugs to unlicensed firearms, wrote in various online forums, including this post on Pastebin. "However, this is only a temporary solution."

The message said operators were working on a solution to block the attacks and planned to bring Agora back online once it was ready. In the meantime, they said, it would be unsafe to continue conducting business as usual.
Details about the attack technique were published last month but the move comes as a surprise as Tor Project officials downplayed the seriousness of the weakness and questioned the likelihood if it could be carried out in practice because the attack not only requires control over the Tor entry point for the server hosting the hidden service but also the collection of unique network characteristics data that can serve as a fingerprint for that particular service.



 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2018 DM Media Group bvba