Are there any known SSH (protocol or implementation) vulnerabilities which can be performed on a tor hidden service?

The last couple of weeks I have been researching possible attacks that can be performed on a Tor hidden service using SSH from a location different from that of the server, assuming the .onion address has already been deanonymised.
I am on… Continue reading Are there any known SSH (protocol or implementation) vulnerabilities which can be performed on a tor hidden service?

Someone Is Running Lots of Tor Relays

Since 2017, someone is running about a thousand — 10% of the total — Tor servers in an attempt to deanonymize the network:

Grouping these servers under the KAX17 umbrella, Nusenu says this threat actor has constantly added servers with no contact details to the Tor network in industrial quantities, operating servers in the realm of hundreds at any given point.

The actor’s servers are typically located in data centers spread all over the world and are typically configured as entry and middle points primarily, although KAX17 also operates a small number of exit points…

Continue reading Someone Is Running Lots of Tor Relays

Tor IP Renewal For The Win

I’m using Tor for so long that I can’t remember! The main reasons to use it are to access some websites while preserving my anonymity (after all that’s the main purpose of Tor) but also to access dangerous resources like command & control servers or sites delivering malicious content. The

The post Tor IP Renewal For The Win appeared first on /dev/random.

Continue reading Tor IP Renewal For The Win

Does using IP address over Tor with a one essential website expose me to any attack surface?

I routinely access www.email-provider-of-my-choice.com via browser over Tor. My browser enforces https-only mode and I opt for never saving my credentials with this provider. I tend to use the domain address and not the Tor address of my … Continue reading Does using IP address over Tor with a one essential website expose me to any attack surface?