Tor Responds to Reports of German Police Deanonymizing Users

Share This Post

The maintainers of the Tor anonymity network have responded to reports that German law enforcement has found a way to deanonymize users.

Germany’s Panorama TV program and investigative journalism outfit STRG_F have obtained evidence showing that the country’s Federal Criminal Police Office (BKA) and the Public Prosecutor General’s Office in Frankfurt were able to identify at least one user suspected of being involved in the distribution of child sexual abuse materials on the dark web. 

Law enforcement leveraged extended monitoring of Tor nodes and timing analysis to determine exactly which nodes had been used by the perpetrator, ultimately obtaining information on his real identity from the ISP. 

The law enforcement operation was carried out between 2019 and 2021 and resulted in a long prison sentence being handed out to the suspect in late 2022. 

Security experts from Germany’s famous Chaos Computer Club (CCC) have reviewed technical details of the attack and confirmed that the deanonymization method works. 

A CCC representative and German media suggested that the Tor Project needs to make significant improvements considering that the method could be used by not only law enforcement but also by authoritarian regimes to unmask Tor users.

The Tor Project, on the other hand, has not received the technical information and says it’s left with more questions than answers. The organization is hoping to obtain the same information that was provided to the CCC to be able to conduct a detailed investigation.

However, the Tor Project says the information it has been presented with suggests that users can continue to confidently rely on the anonymity network to protect their identity. 

Advertisement. Scroll to continue reading.

The Tor Project explained:

The Tor Project highlighted that since the operation conducted by law enforcement in 2019-2021, new features have been added to protect against these types of timing attacks, which require long-lived user connections. 

Related: Tor Code Audit Finds 17 Vulnerabilities

Related: Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies

Related: Tor Network Removes Risky Relays Associated With Cryptocurrency Scheme

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.