Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted Traffic

A new analysis of website fingerprinting (WF) attacks aimed at the Tor web browser has revealed that it's possible for an adversary to glean a website frequented by a victim, but only in scenarios where the threat actor is interested in a specific subset of the websites visited by users. "While attacks can exceed 95% accuracy when monitoring a small set of five popular websites, indiscriminate (

from The Hacker News https://ift.tt/3ngXQxS
via IFTTT

Comments

Popular posts from this blog

Critical Bugs Reported in Popular Open Source PJSIP SIP and Media Stack

Experts Reveal Over 150 Ways to Steal Control of 58 Android Stalkerware Apps