What Expert Says On Hackers exploited Tor exit relays to generate bitcoin

At one point this spring, a single set of money-hungry hackers controlled nearly a quarter of the endpoint infrastructure through which the anonymizing internet browser Tor routed traffic, a researcher who tracks Tor claimed this week.


EXPERTS COMMENTS
Chad Anderson, Research Engineer ,  DomainTools
August 13, 2020
This by no means is a new attack, but this scale is interesting.
One major flaw of Tor is that any dedicated actor with enough resources can spin up enough nodes to break anonymity in the network. This has been a known type of attack, and something that intelligence agencies have been observed doing in the past. The scale of the effort required means that only groups with large financial resources are capable of pulling this off so typically these operations ar ....
[Read More >>]

If you are an expert on this topic:

Submit Your Expert Comments


In this article