Open in app

Sign In

Write

Sign In

nusenu
nusenu

407 Followers

Home

About

Nov 29, 2021

Is “KAX17” performing de-anonymization Attacks against Tor Users?

Hashtag: #KAX17 Two years ago in December 2019, I first wrote about a particular and unusual malicious actor on the tor network. This blog post is about how that actor expanded their visibility into the tor network during the last two years after their removal by the tor directory authorities…

Security

10 min read

Is “KAX17” performing de-anonymization Attacks against Tor Users?
Is “KAX17” performing de-anonymization Attacks against Tor Users?
Security

10 min read


May 8, 2021

Tracking One Year of Malicious Tor Exit Relay Activities (Part II)

>25% of the Tor network’s exit capacity has been attacking Tor users In August 2020 I reported about “How Malicious Tor Relays are Exploiting Users in 2020 (Part I)”. Back then I made the hypothesis that the entity behind these malicious tor relays is not going to stop its activities…

Security

19 min read

Tracking One Year of Malicious Tor Exit Relay Activities (Part II)
Tracking One Year of Malicious Tor Exit Relay Activities (Part II)
Security

19 min read


Aug 9, 2020

How Malicious Tor Relays are Exploiting Users in 2020 (Part I)

>23% of the Tor network’s exit capacity has been attacking Tor users — In December 2019 I wrote about The Growing Problem of Malicious Relays on the Tor Network with the motivation to rise awareness and to improve the situation over time. Unfortunately instead of improving, things have become even worse, specifically when it comes to malicious Tor exit relay activity. Tor exit…

Privacy

12 min read

How Malicious Tor Relays are Exploiting Users in 2020 (Part I)
How Malicious Tor Relays are Exploiting Users in 2020 (Part I)
Privacy

12 min read


Jan 12, 2020

Why I disappeared from Twitter

Since there have been some speculations and questions around why all of a sudden I disappeared from twitter I’d figure I give you with my side of the story. TLDR: I don’t know why my account got suspended and my appeal was turned down. Initially I created my twitter account…

Security

4 min read

Why I disappeared from Twitter
Why I disappeared from Twitter
Security

4 min read


Dec 8, 2019

The Growing Problem of Malicious Relays on the Tor Network

Background I’ve a long standing interest in the state of the Tor network. In 2015 I started OrNetRadar to help detect new relay groups and possible Sybil attacks that could pose a risk to Tor users. In 2017 I was asked to join a closed Tor Project mailing list to help…

Privacy

6 min read

The Growing Problem of Malicious Relays on the Tor Network
The Growing Problem of Malicious Relays on the Tor Network
Privacy

6 min read


Jul 11, 2019

What Fraction of Tor’s DNS Traffic goes to Google and Cloudflare?

“Who controls Tor’s DNS traffic?” revisited Over a year ago, in April 2018, we looked into Tor’s DNS landscape and confirmed previous observations from 2016 that a significant fraction of tor exit relays make use of public DNS resolvers like Google’s 8.8.8.8. Now 15 months later, its time to revisit this issue again to find out…

DNS

3 min read

What fraction of Tor’s DNS traffic goes to Google and Cloudflare?
What fraction of Tor’s DNS traffic goes to Google and Cloudflare?
DNS

3 min read


Sep 25, 2018

Where are RPKI unreachable networks located?

Mapping the RPKI unreachable IP address space. In the previous post (see that for some more context) we analyzed RPKI INVALID IP address prefixes that are unreachable (no alternative route available) and used number of prefixes-origin pairs as primary metric, but argued that prefix-origin-pair-counts are not the best metric (many…

Tech

4 min read

Where are RPKI unreachable networks located?
Where are RPKI unreachable networks located?
Tech

4 min read


Sep 15, 2018

Towards cleaning up RPKI INVALIDs

Up until not too long ago basically no network operator actually protected herself by implementing route origin validation (ROV) to make BGP hijacking attacks harder. Implementing ROV means that BGP prefix-origin pairs are validated against route origin authorizations (ROAs) before they are considered. …

Bgp

7 min read

Towards cleaning up RPKI INVALIDs
Towards cleaning up RPKI INVALIDs
Bgp

7 min read


Aug 20, 2018

How vulnerable is the Tor Network to BGP Hijacking Attacks?

Privacy adversaries may use BGP hijacking attacks to gain access to a bigger portion of Tor traffic than they would be able to see otherwise. …

Bgp

13 min read

How vulnerable is the Tor Network to BGP Hijacking Attacks?
How vulnerable is the Tor Network to BGP Hijacking Attacks?
Bgp

13 min read


May 10, 2018

Who controls Tor’s DNS traffic?

An Analysis of the Tor DNS Landscape. Unlike other relays, tor exit relays also take care of name resolution for tor clients. Their DNS configuration actually determines where the tor network’s DNS traffic is send to. Ever since the tor-dns paper I wanted to take a look at the current state of DNS resolver distributions on the…

DNS

8 min read

Who controls Tor’s DNS traffic?
Who controls Tor’s DNS traffic?
DNS

8 min read

nusenu

nusenu

407 Followers

Tor, Routing Security and DNS Privacy related Topics. https://nusenu.github.io

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech