Questions tagged [deanonymization]
37 questions
85
votes
5 answers
Is changing pitch enough for anonymizing a person's voice?
In every TV program where there's a person that wants to remain anonymous, they change their voice in a way that to me sounds like a simple increase or decrease in pitch (frequencies). What I'm wondering is:
is the usual anonymizing method actually…
reed
- 15,398
- 6
- 43
- 64
16
votes
1 answer
What is this potential identity leak that NoScript warns about?
Recently, while using the Tor Browser, NoScript popped up the following warning when I opened a stack overflow link in a new tab from duckduckgo:
Potential Identity Leak
You are about to load a page from stackoverflow.com. If you are a…
nobody
- 11,251
- 1
- 41
- 60
9
votes
2 answers
How can malware discover the real IP of a TAILS user?
The FBI recently used a 0day exploit to hack a TAILS user and expose their real IP.
I am interested in how they could have managed to obtain the user's real public IP after compromising the machine. Since TAILS sends ALL network communications over…
nobody
- 11,251
- 1
- 41
- 60
7
votes
2 answers
Can DeepCorr's correlation technique de-anonymize all Tor users?
https://people.cs.umass.edu/~amir/papers/CCS18-DeepCorr.pdf
https://www.youtube.com/watch?v=_OKLtKgEn4k
I have some questions about this "Deepcorr". Does "DeepCorr" really work that good? They say that "DeepCorr’s performance does not degrade with…
Eleanor
- 91
- 4
6
votes
2 answers
What category of anonymity do onion routing and blockchains afford?
My understanding is that a strict definition of anonymity means that defeating the security mechanism is logically impossible or mathematically infeasible, and therefore so is deducing the identity. (An example would be blind signatures. Mechanisms…
lofidevops
- 3,550
- 6
- 23
- 32
6
votes
2 answers
How can intelligence services be so sure that Russia is the culprit?
Recently,
US and non-US media has been publishing many articles regarding Russia being involved in the "Podesta-hack" or even accusing Putin of being directly responsible.
For example:
"Putin directly involved in US election hacking" (MSNBC)
"White…
Doc
- 163
- 2
4
votes
1 answer
Accessing over a VPN both sites that know your real identity and sites you want to stay private from
Goal 1: access certain "anonymous" sites that you don't want to provide your real identity, IP or location to.
Goal 2: access "regular" sites that do require or have your real identity, such as your bank or Facebook.
All sites use end-to-end…
Sam
- 111
- 2
3
votes
3 answers
Anonymizing IP addresses using (sha) hashes; how to circumvent rainbow table attacks?
Under GDPR, IP addresses are personal data. I have no need to trace back IP to specific users, but I would like to limit downloads to one per IP.* I do not want to store plain IPs.
My first solution would be to hash the IP. I could store the…
Karel
- 133
- 4
3
votes
1 answer
Attacks on decentralised networks by running a fleet of nodes with modified software
At least some decentralised networks purported to provide anonymity are vulnerable to this attack: the original software is modified to allow tracking/logging/whatever, and a large amount of nodes running this modified software joins the network.…
Greendrake
- 669
- 1
- 8
- 17
2
votes
2 answers
Feasability of deanonymizing commercially available advertiser data
Yesterday, Msgr. Jeffrey Burrill of the U.S Council of Catholic Bishops resigned because an investigation by Pillar, a Catholic newsletter, alleged that he had used Grindr to find hookups. Fairly standard stuff, but the truly perplexing part was the…
Benthlin
- 21
- 2
2
votes
1 answer
Hiding Tor traffic to prevent deanonymization
I am trying to figure out what is the best way to hide Tor traffic in order to improve anonymity.
While Tor is pretty good at hiding users’ IP addresses, its traffic stands out. This can be detrimental in some cases.
In this article (FBI agents…
Gregoire42
- 29
- 2
2
votes
2 answers
Does accessing a personally owned Tor node (that only you ever visit) over the Tor network break anonymity?
Does accessing a personally owned Tor node (that only you ever visit) over the Tor network break anonymity?
I read from a long guide by Whonix on how to properly use Tor that I shouldn't ever access small personal clearnet websites over the Tor…
dknet
- 21
- 1
2
votes
1 answer
Can you serve up special content to an end-user based on IP or other identifiable data?
Is it possible to serve up specific content to an end-user? For example, I know your IP address, and other device information. Can I use that to serve up certain search results on a search engine, certain videos on websites, and use that to target…
BestReasonofWiseMen
- 21
- 2
2
votes
1 answer
Identify anonymous mobile phone user by network participants
I have wondered this for quite some time but have not found any references. In the TV series "The wire" they use disposable prepaid mobile phones as a counter-surveillance technique. However if someone uses a prepaid mobile phone and connects to the…
CuriousIndeed
- 161
- 1
- 10
2
votes
1 answer
Few Questions About Tor Hidden Services
According to this, when you connect to a hidden service using tor you go through 6 nodes instead of 3... why?
From what I understand when you connect to a website that is not a hidden service you connect to their IP, but it is shown as a domain…
tim petrem
- 33
- 3