It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis. Using Tor makes tracing Internet activity, including "visits to Web sites, online posts, instant messages and other communication forms", to the user more difficult.[7] It is intended to protect users' personal freedom, privacy, and ability to conduct confidential business, by keeping their internet activities from being monitored.[8] The software is open-source and the network is free of charge to use.
link
A group called Packet Storm has published a paper detailing how the true IP addresses of Tor users can be discovered by the party that controls their traffic's exit node
tomorrow there's a talk at Black Hat DC by Xinwen Fu on an active attack that can allow traffic confirmation in Tor. He calls it a "replay attack", whereas we called it a "tagging attack" in the original Tor paper, but let's look at how it actually works.
Tor is a network of virtual tunnels which allows separate persons or groups of people to increase their security and protect their anonymity on Internet. In early January we discovered that two of the seven servers that run directory authorities were compromised.