ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
November 14, 2017 5:41 PM
Scoop.it!

Tor-Browser jetzt in Version 7.0.10: Anonym surfen unter Windows, macOS, Android und iOS | Wer im Internet surft, ist Freiwild | #Privacy #Anonymity #Browser #Awareness 

Tor-Browser jetzt in Version 7.0.10: Anonym surfen unter Windows, macOS, Android und iOS | Wer im Internet surft, ist Freiwild | #Privacy #Anonymity #Browser #Awareness  | ICT Security-Sécurité PC et Internet | Scoop.it
Wer im Internet surft, ist Freiwild. Von allen Seiten wird Ihr Browser angezapft: sei es von der Werbeindustrie, von Dienstanbietern, Geheimdiensten und Hackern. Das Tor-Netzwerk ist zwar in den letzten Jahren etwas in Verruf geraten, bietet aber immer noch mehr Anonymität als alle anderen Maßnahmen. Außerdem kommen Sie über den Tor-Browser in das sonst geheime Darknet.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=TOR

 

Gust MEES's insight:
Wer im Internet surft, ist Freiwild. Von allen Seiten wird Ihr Browser angezapft: sei es von der Werbeindustrie, von Dienstanbietern, Geheimdiensten und Hackern. Das Tor-Netzwerk ist zwar in den letzten Jahren etwas in Verruf geraten, bietet aber immer noch mehr Anonymität als alle anderen Maßnahmen. Außerdem kommen Sie über den Tor-Browser in das sonst geheime Darknet.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=TOR

 

No comment yet.
Scooped by Gust MEES
December 1, 2016 8:03 PM
Scoop.it!

#Awareness!!! Firefox and Tor users update now: 0-day exploit in the wild | #Updates #CyberSecurity #Anonymity 

#Awareness!!! Firefox and Tor users update now: 0-day exploit in the wild | #Updates #CyberSecurity #Anonymity  | ICT Security-Sécurité PC et Internet | Scoop.it
Firefox and Tor just received a patch to fix a 0-day exploit that is being used in the wild to strip away your anonymity.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

Gust MEES's insight:
Firefox and Tor just received a patch to fix a 0-day exploit that is being used in the wild to strip away your anonymity.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

 

No comment yet.
Scooped by Gust MEES
October 5, 2016 10:01 AM
Scoop.it!

Unmasking Tor users with DNS

Unmasking Tor users with DNS | ICT Security-Sécurité PC et Internet | Scoop.it

Researchers at the KTH Royal Institute of Technology, Stockholm, and Princeton University in the USA have unveiled a new way to attack Tor and deanonymise its users.

The attack, dubbed DefecTor by the researchers’ in their recently published paper The Effect of DNS on Tor’s Anonymity, uses the DNS lookups that accompany our browsing, emailing and chatting to create a new spin on Tor’s most well established weakness; correlation attacks.

Tor works by routing users’ traffic through ‘circuits’ of computers to obscure where the traffic originates. The first computer in a circuit is drawn from a pool of about 2,500 ‘entry guards’ and the last from a smaller pool of about 1,000 ‘exit nodes’.

Correlation attacks observe the traffic entering and leaving Tor, and then attempt to pair up incoming and outgoing streams.

Because the traffic that passes from the client, through the circuit and all the way to the exit node is encrypted, attackers can’t just read it. Instead they have to use low level details like packet lengths and directions to look for known patterns that reveal what sites a user is visiting – a technique called fingerprinting.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

Gust MEES's insight:

Researchers at the KTH Royal Institute of Technology, Stockholm, and Princeton University in the USA have unveiled a new way to attack Tor and deanonymise its users.

The attack, dubbed DefecTor by the researchers’ in their recently published paper The Effect of DNS on Tor’s Anonymity, uses the DNS lookups that accompany our browsing, emailing and chatting to create a new spin on Tor’s most well established weakness; correlation attacks.

Tor works by routing users’ traffic through ‘circuits’ of computers to obscure where the traffic originates. The first computer in a circuit is drawn from a pool of about 2,500 ‘entry guards’ and the last from a smaller pool of about 1,000 ‘exit nodes’.

Correlation attacks observe the traffic entering and leaving Tor, and then attempt to pair up incoming and outgoing streams.

Because the traffic that passes from the client, through the circuit and all the way to the exit node is encrypted, attackers can’t just read it. Instead they have to use low level details like packet lengths and directions to look for known patterns that reveal what sites a user is visiting – a technique called fingerprinting.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

 

No comment yet.
Scooped by Gust MEES
February 22, 2016 11:35 AM
Scoop.it!

Security: Rätselhafter Anstieg von Tor-Adressen - Golem.de

Security: Rätselhafter Anstieg von Tor-Adressen - Golem.de | ICT Security-Sécurité PC et Internet | Scoop.it
Ein ungewöhnlicher Anstieg von .onion-Adressen im Tor-Netzwerk gibt zurzeit Rätsel auf. Grund für den Anstieg könnte eine neue Messaging-App sein - oder Malware.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Ein ungewöhnlicher Anstieg von .onion-Adressen im Tor-Netzwerk gibt zurzeit Rätsel auf. Grund für den Anstieg könnte eine neue Messaging-App sein - oder Malware.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR




No comment yet.
Scooped by Gust MEES
August 3, 2015 8:07 PM
Scoop.it!

Can you trust Tor's entry guards? | TOR

Can you trust Tor's entry guards? | TOR | ICT Security-Sécurité PC et Internet | Scoop.it
Eight years ago researcher Dan Egerstad demonstrated how useful having your own Tor exit nodes can be if you want to spy on people by setting up five of his own.

He used them to harvest thousands of emails and messages from embassies in Australia, Japan, Iran, India and Russia, as well as the Iranian Foreign Ministry and the Indian Ministry of Defence.

He was running exit nodes rather than entry guards but his conclusion applies to both - he was convinced (although he provided no proof of it) that governments would surely be running or spying on Tor relays too:

I am absolutely positive that I am not the only one to figure this out ... I'm pretty sure there are governments doing the exact same thing. There's probably a reason why people are volunteering to set up a node.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Eight years ago researcher Dan Egerstad demonstrated how useful having your own Tor exit nodes can be if you want to spy on people by setting up five of his own.

He used them to harvest thousands of emails and messages from embassies in Australia, Japan, Iran, India and Russia, as well as the Iranian Foreign Ministry and the Indian Ministry of Defence.

He was running exit nodes rather than entry guards but his conclusion applies to both - he was convinced (although he provided no proof of it) that governments would surely be running or spying on Tor relays too:

I am absolutely positive that I am not the only one to figure this out ... I'm pretty sure there are governments doing the exact same thing. There's probably a reason why people are volunteering to set up a node.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
July 7, 2015 10:04 AM
Scoop.it!

Traffic in Tor network is being sniffed in the exit nodes

Traffic in Tor network is being sniffed in the exit nodes | ICT Security-Sécurité PC et Internet | Scoop.it
A security researcher conducted an experiment to demonstrate that someone is sniffing passing traffic from Tor network exit nodes.
When talking about Tor network, normally everyone assumes that you have an end-to-end security, but someone believes it may be wrong as it was discovered by the security researcher Chloe.

Tor network is free and it is the safest way to be anonymous since it hides your original IP from the destination server, to do that Tor uses relays to redirect traffic, but now the security researcher Chloe concludes that traffic is being sniffed in the exit nodes.
Gust MEES's insight:
A security researcher conducted an experiment to demonstrate that someone is sniffing passing traffic from Tor network exit nodes.

When talking about Tor network, normally everyone assumes that you have an end-to-end security, but someone believes it may be wrong as it was discovered by the security researcher Chloe.

Tor network is free and it is the safest way to be anonymous since it hides your original IP from the destination server, to do that Tor uses relays to redirect traffic, but now the security researcher Chloe concludes that traffic is being sniffed in the exit nodes.


No comment yet.
Scooped by Gust MEES
May 27, 2015 4:40 PM
Scoop.it!

Online-Dienst erstellt maßgeschneiderte Krypto-Trojaner | TOR | CyberSecurity | eSkills

Online-Dienst erstellt maßgeschneiderte Krypto-Trojaner | TOR | CyberSecurity | eSkills | ICT Security-Sécurité PC et Internet | Scoop.it
Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
December 28, 2014 10:05 AM
Scoop.it!

Who hacked a cluster of Tor servers in the Netherlands?

Who hacked a cluster of Tor servers in the Netherlands? | ICT Security-Sécurité PC et Internet | Scoop.it
A cluster of Tor servers suffered an unexplained outage just after the warning of the Tor project. Only certainty is someone physically accessed servers.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
A cluster of Tor servers suffered an unexplained outage just after the warning of the Tor project. Only certainty is someone physically accessed servers.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
November 10, 2014 11:31 AM
Scoop.it!

Thoughts and Concerns about Operation Onymous | The Tor Blog

Thoughts and Concerns about Operation Onymous | The Tor Blog | ICT Security-Sécurité PC et Internet | Scoop.it

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
July 3, 2014 12:34 PM
Scoop.it!

Tor-Netzwerk: Aktivisten trotzen der NSA

Tor-Netzwerk: Aktivisten trotzen der NSA | ICT Security-Sécurité PC et Internet | Scoop.it
Im Visier der mächtigen NSA: Weil der Student Sebastian Hahn bei einem Dienst zur anonymen Internetnutzung hilft, landete einer seiner Server im Raster des Geheimdienstes. Das schreckt ihn nicht ab.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Im Visier der mächtigen NSA: Weil der Student Sebastian Hahn bei einem Dienst zur anonymen Internetnutzung hilft, landete einer seiner Server im Raster des Geheimdienstes. Das schreckt ihn nicht ab.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


No comment yet.
Scooped by Gust MEES
January 13, 2017 12:45 PM
Scoop.it!

Tor users at risk of being unmasked by ultrasound tracking | #CyberSecurity #Privacy 

Tor users at risk of being unmasked by ultrasound tracking | #CyberSecurity #Privacy  | ICT Security-Sécurité PC et Internet | Scoop.it
Researcher demonstrates how sound outside human hearing could be used by law enforcement - or by more sinister actors

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

Gust MEES's insight:
Researcher demonstrates how sound outside human hearing could be used by law enforcement - or by more sinister actors

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

No comment yet.
Scooped by Gust MEES
November 30, 2016 6:32 AM
Scoop.it!

0-Day: Nutzer des Tor-Browsers werden mit Javascript angegriffen | #Privacy #Anonymity #Awareness 

0-Day: Nutzer des Tor-Browsers werden mit Javascript angegriffen | #Privacy #Anonymity #Awareness  | ICT Security-Sécurité PC et Internet | Scoop.it
Nutzer des Tor-Browsers werden mit Javascript angegriffen
Wer den Tor-Browsers nutzt, will meist vor allem eins: Anonymität. Eine aktuelle Schwachstelle im Firefox-Browser führt aber dazu, dass Nutzer identifiziert werden können. Das Problem betrifft auch Nutzer des regulären Firefox - ein Patch ist in Arbeit.
Nutzer des Tor-Browsers werden derzeit aktiv mit einer 0-Day-Lücke angegriffen, die einen Fehler im Speichermanagement des verwendeten Firefox-Browsers ausnutzt. Möglicherweise sind auch Nutzer von Firefox ohne Tor-Bundle betroffen. Die Sicherheitslücke soll es Angreifern ermöglichen, Code auf dem Rechner der Tor-Nutzer auszuführen. Mozilla arbeitet noch an einem Patch.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

Gust MEES's insight:
Nutzer des Tor-Browsers werden mit Javascript angegriffen
Wer den Tor-Browsers nutzt, will meist vor allem eins: Anonymität. Eine aktuelle Schwachstelle im Firefox-Browser führt aber dazu, dass Nutzer identifiziert werden können. Das Problem betrifft auch Nutzer des regulären Firefox - ein Patch ist in Arbeit.
Nutzer des Tor-Browsers werden derzeit aktiv mit einer 0-Day-Lücke angegriffen, die einen Fehler im Speichermanagement des verwendeten Firefox-Browsers ausnutzt. Möglicherweise sind auch Nutzer von Firefox ohne Tor-Bundle betroffen. Die Sicherheitslücke soll es Angreifern ermöglichen, Code auf dem Rechner der Tor-Nutzer auszuführen. Mozilla arbeitet noch an einem Patch.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

 

No comment yet.
Scooped by Gust MEES
July 27, 2016 11:11 AM
Scoop.it!

Researchers find more than 100 Tor nodes that are snooping on users | #CyberSecurity #Privacy #Awareness

Researchers find more than 100 Tor nodes that are snooping on users | #CyberSecurity #Privacy #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it

Tor, or “The Onion Router” as it was originally known, is used around the world as an anonymity network. It provides a private method of communication for journalists, those living under authoritarian governments, and people who are just up to some shady stuff. While Tor is still the most robust form of online anonymity we have, it’s not bulletproof as the repeated takedown of The Silk Road and other law enforcement actions have shown. Now, two computer scientists say they’ve uncovered snoops inside the Tor network that may be listening in on what you’re doing.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet?q=tor

 

Gust MEES's insight:

Tor, or “The Onion Router” as it was originally known, is used around the world as an anonymity network. It provides a private method of communication for journalists, those living under authoritarian governments, and people who are just up to some shady stuff. While Tor is still the most robust form of online anonymity we have, it’s not bulletproof as the repeated takedown of The Silk Road and other law enforcement actions have shown. Now, two computer scientists say they’ve uncovered snoops inside the Tor network that may be listening in on what you’re doing.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet?q=tor

 

 

No comment yet.
Scooped by Gust MEES
February 5, 2016 10:25 AM
Scoop.it!

Apache verpetzt möglicherweise Tor Hidden Services

Apache verpetzt möglicherweise Tor Hidden Services | ICT Security-Sécurité PC et Internet | Scoop.it
In seiner Standard-Konfiguration liefert der beliebte Web-Server-Dienst Informationen, die die Anonymitäts-Versprechen eines Tor Hidden Services gefährden. Diese anonymen Tor-Dienste sind der Kern des oft zitierten "Dark Net".


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

In seiner Standard-Konfiguration liefert der beliebte Web-Server-Dienst Informationen, die die Anonymitäts-Versprechen eines Tor Hidden Services gefährden. Diese anonymen Tor-Dienste sind der Kern des oft zitierten "Dark Net".


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



No comment yet.
Scooped by Gust MEES
July 29, 2015 6:21 PM
Scoop.it!

MIT researchers figure out how to break Tor anonymity without cracking encryption | CyberSecurity | Privacy

MIT researchers figure out how to break Tor anonymity without cracking encryption | CyberSecurity | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it



Researchers can identify which hidden service you're connecting to with 88% accuracy.




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:

Researchers can identify which hidden service you're connecting to with 88% accuracy.



Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
May 27, 2015 4:46 PM
Scoop.it!

Meet 'Tox': Ransomware for the Rest of Us | ICT | CyberSecurity | eSkills

Meet 'Tox': Ransomware for the Rest of Us | ICT | CyberSecurity | eSkills | ICT Security-Sécurité PC et Internet | Scoop.it
Similar to other threats, ransomware has now appeared in an easy-to-deploy cybercrime kit. The malware is called Tox, and it's free.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Similar to other threats, ransomware has now appeared in an easy-to-deploy cybercrime kit. The malware is called Tox, and it's free.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
January 16, 2015 8:49 AM
Scoop.it!

Hidden Services: Die Deanonymisierung des Tor-Netzwerks | Privacy

Hidden Services: Die Deanonymisierung des Tor-Netzwerks | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Das Tor-Netzwerk: Dort tummeln sich Whistleblower, Aktivisten, politisch Verfolgte, aber auch Drogenhändler oder Pädophile. Alle wollen dort aus unterschiedlichen Motiven ihre Anonymität bewahren. Es gibt aber Zweifel an der Effektivität der Anonymisierung.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:
Das Tor-Netzwerk: Dort tummeln sich Whistleblower, Aktivisten, politisch Verfolgte, aber auch Drogenhändler oder Pädophile. Alle wollen dort aus unterschiedlichen Motiven ihre Anonymität bewahren. Es gibt aber Zweifel an der Effektivität der Anonymisierung.



Learn more:




http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
November 14, 2014 10:24 PM
Scoop.it!

81% of Tor users can be de-anonymised by analysing router information, research indicates

81% of Tor users can be de-anonymised by analysing router information, research indicates | ICT Security-Sécurité PC et Internet | Scoop.it
Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.


Learn more:


- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
November 7, 2014 3:50 PM
Scoop.it!

How Did The FBI Break Tor?

How Did The FBI Break Tor? | ICT Security-Sécurité PC et Internet | Scoop.it
If you control enough of the Tor network, it’s possible to get a kind of bird’s eye view of the traffic being routed through it. It was clear that Tor thought the Carnegie Mellon researchers were responsible. The researchers refused to talk to the press, but a conference spokesperson told Reuters the talk was canceled because the researchers hadn’t cleared the release of their work through their department, the Software Engineering Institute, which is funded by the Defense Department.


At the time, many assumed that the university pulled the plug on the talk because of the gray legal zone it was in, with the researchers casually intercepting Web traffic. But maybe it got pulled because the researchers were revealing a law enforcement technique that the government did not want publicized. If nothing else, it’s highly likely the information the researchers collected about “drug dealers and child pornographers” made its way into law enforcement hands. McCord said he was “unable to comment on the matter.” Carnegie Mellon’s SEI declined comment about the canceled talk and about whether it had provided information from the research to law enforcement.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
If you control enough of the Tor network, it’s possible to get a kind of bird’s eye view of the traffic being routed through it. It was clear that Tor thought the Carnegie Mellon researchers were responsible. The researchers refused to talk to the press, but a conference spokesperson told Reuters the talk was canceled because the researchers hadn’t cleared the release of their work through their department, the Software Engineering Institute, which is funded by the Defense Department.


At the time, many assumed that the university pulled the plug on the talk because of the gray legal zone it was in, with the researchers casually intercepting Web traffic. But maybe it got pulled because the researchers were revealing a law enforcement technique that the government did not want publicized. If nothing else, it’s highly likely the information the researchers collected about “drug dealers and child pornographers” made its way into law enforcement hands. McCord said he was “unable to comment on the matter.” Carnegie Mellon’s SEI declined comment about the canceled talk and about whether it had provided information from the research to law enforcement.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.