Friend
Professional
- Messages
- 2,653
- Reaction score
- 850
- Points
- 113
The method of the German special services allows you to identify the criminal by timing.
German law enforcement agencies have begun to actively use new methods to de-anonymize Tor users. Journalists from ARD-Politikmagazin Panorama and STRG_F (funk/NDR) found out that the German special services use long-term monitoring of Tor servers to reveal the identities of users. Such measures are aimed, first of all, at combating crime on the darknet.
Studies have shown that the data obtained is processed by special statistical methods that allow you to completely destroy the anonymity of Tor. Journalists were able to familiarize themselves with documents confirming the successful use of such methods in four cases. These are the first recorded cases of the use of the so-called "Timing-Analyse" in one criminal case. Previously, it was believed that such actions were almost impossible.
Tor is the world's largest network for anonymous use of the Internet. Users reroute their connections through various servers to hide their online activities. There are about 8,000 Tor relays in the world, located in 50 countries. About 2 million people use this network every day. Tor is especially popular with journalists, human rights defenders, and activists, especially in countries with internet censorship. Many media outlets, such as Deutsche Welle, use Tor to provide access to their sites in countries with restrictions on the free dissemination of information.
However, the anonymity of the Tor network attracts not only human rights activists, but also criminals who use the network for cyberattacks and illegal activities on darknet platforms. Previously, law enforcement agencies faced serious technical difficulties when trying to reveal the identity of users. However, recent investigations by Panorama and STRG_F have shown that the strategy has been changed and long-term monitoring of network nodes is now used.
The essence of Timing-Analyse is to monitor a large number of Tor relays. The principle of the method is to compare timestamps of data transmission through different network nodes. Despite the multi-layered encryption of connections in Tor, the analysis allows you to monitor the movement of data between nodes and users, identifying certain patterns that can point to a specific person.
Even if the traffic is repeatedly encrypted, the correlation of the time of sending and receiving data packets makes it possible to determine the source of the connection. A key element of the technique is the need to control as many relays in the Tor network as possible. This makes it possible to analyze the correlations between the time of sending and receiving data, which ultimately leads to de-anonymization.
One of the successful examples of this method was the case against the darknet platform Boystown. Investigators were able to identify Tor nodes that were used by one of the platform administrators to hide his activities. Experts were also able to identify chat servers where members of criminal communities communicated. This allowed law enforcement to identify and arrest the criminals.
Cooperation with law enforcement agencies in the Netherlands and the United States has also played a key role in solving crimes related to the Tor network. The number of nodes under control in Germany has increased significantly in recent years, which has made it possible to use the Timing-Analyse method more widely.
Experts warn that such technologies can be used not only to fight crime, but also to persecute opposition figures in countries with repressive regimes. Representatives of the Tor Project have already stated that they are taking measures to increase the level of anonymity of users in order to prevent similar attacks in the future.
Recall that recently German law enforcement agencies searched the house and office registered to the address of the organization Artikel 5 e.V., which supports the Tor network. This is the second such case after a similar raid in 2017.
Source
German law enforcement agencies have begun to actively use new methods to de-anonymize Tor users. Journalists from ARD-Politikmagazin Panorama and STRG_F (funk/NDR) found out that the German special services use long-term monitoring of Tor servers to reveal the identities of users. Such measures are aimed, first of all, at combating crime on the darknet.
Studies have shown that the data obtained is processed by special statistical methods that allow you to completely destroy the anonymity of Tor. Journalists were able to familiarize themselves with documents confirming the successful use of such methods in four cases. These are the first recorded cases of the use of the so-called "Timing-Analyse" in one criminal case. Previously, it was believed that such actions were almost impossible.
Tor is the world's largest network for anonymous use of the Internet. Users reroute their connections through various servers to hide their online activities. There are about 8,000 Tor relays in the world, located in 50 countries. About 2 million people use this network every day. Tor is especially popular with journalists, human rights defenders, and activists, especially in countries with internet censorship. Many media outlets, such as Deutsche Welle, use Tor to provide access to their sites in countries with restrictions on the free dissemination of information.
However, the anonymity of the Tor network attracts not only human rights activists, but also criminals who use the network for cyberattacks and illegal activities on darknet platforms. Previously, law enforcement agencies faced serious technical difficulties when trying to reveal the identity of users. However, recent investigations by Panorama and STRG_F have shown that the strategy has been changed and long-term monitoring of network nodes is now used.
The essence of Timing-Analyse is to monitor a large number of Tor relays. The principle of the method is to compare timestamps of data transmission through different network nodes. Despite the multi-layered encryption of connections in Tor, the analysis allows you to monitor the movement of data between nodes and users, identifying certain patterns that can point to a specific person.
Even if the traffic is repeatedly encrypted, the correlation of the time of sending and receiving data packets makes it possible to determine the source of the connection. A key element of the technique is the need to control as many relays in the Tor network as possible. This makes it possible to analyze the correlations between the time of sending and receiving data, which ultimately leads to de-anonymization.
One of the successful examples of this method was the case against the darknet platform Boystown. Investigators were able to identify Tor nodes that were used by one of the platform administrators to hide his activities. Experts were also able to identify chat servers where members of criminal communities communicated. This allowed law enforcement to identify and arrest the criminals.
Cooperation with law enforcement agencies in the Netherlands and the United States has also played a key role in solving crimes related to the Tor network. The number of nodes under control in Germany has increased significantly in recent years, which has made it possible to use the Timing-Analyse method more widely.
Experts warn that such technologies can be used not only to fight crime, but also to persecute opposition figures in countries with repressive regimes. Representatives of the Tor Project have already stated that they are taking measures to increase the level of anonymity of users in order to prevent similar attacks in the future.
Recall that recently German law enforcement agencies searched the house and office registered to the address of the organization Artikel 5 e.V., which supports the Tor network. This is the second such case after a similar raid in 2017.
Source