Biography
Interests
Christos Beretas, P.
PhD Candidate (Full Scholarship) in Cyber Security at Innovative Knowledge Institute, Paris, France
*Correspondence to: Dr. Christos Beretas, P., PhD Candidate (Full Scholarship) in Cyber Security at Innovative Knowledge Institute, Paris, France.
Copyright © 2020 Dr. Christos Beretas, P. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
The TOR network is an anonymity network whose real power and the vulnerabilities that accompany it only few people known. There are several suspicious Servers worldwide that haunt the operation of TOR, Servers with strange behavior who participate in a honeypot programs, not only users who use the TOR network do not enjoy the privileges of real anonymity, on the contrary they are vulnerable and their traces are mapped. There are Active Servers in the TOR network that collect information but also attack the other TOR servers that are active in the network in order to reduce their functionality and then convert a honeypot network while the users are unawareness. It is worth noting that suspicious TOR servers may or may not be on professional infrastructures.
Introduction
TOR is a very popular Project, a global anonymity network loved by millions of internet users, used by
people who want to express their opinion online, take malicious actions, transfer files from one location to
another without these files are compromised, their location is not detected, etc. All the above actions are
performed so as not to be detected by ISPs or to log their online data from the websites they want to visit,
thus significantly reducing the risk to be detected, although the ISP knows when a user is connecting to the
TOR network but without being able to see the contents of the packets. TOR started for another purpose and ended up being used for another purpose. Designed by the U.S Navy for the exchange of confidential
data and ended up an open source project, this in itself is questionable and needs a lot of skepticism, how
an anonymity project that was designed to be used for the secrecy of communications was left free to users
making life difficult for the secret services worldwide to detect dangerous online transactions and prevent
malicious actions, isn’t that true after all? Did the government create an anonymity project to make its
life more difficult? is this whole endeavor a delusion? Is this whole project deliberately in the interest of
governments?
Most internet anonymity users prefer TOR over a VPN, thinking that the VPN service provider could keep log files that could easily be passed on to governments or other stakeholders, depending on international agreements. as well as by the country of operation of the VPN service provider and the privacy and confidential communications policies it implements in accordance with its legislation. According to research i have done, below I point out some points which are a red flag for the integrity of the data circulating in the TOR network and which in some of the following ways individually or as a whole could be intercepted.
• Fake Relays (Middle or Exit Nodes).
• Malicious Code injected in target web sites.
• Back doors in encryption algorithms.
• Malicious software installed in target computer systems.
• Fake HTTPS.
Let’s analyze the above 5 points one by one:
To understand this section there must be a substantive knowledge of the operation of the TOR. A user of
the TOR network every time he/she browse the internet goes through different Relays as this means when
the data reaches the TOR exit Node its IP address changes as it appears to be browsing the internet from a
different location. Here comes on mind the following question, most IP detection and IP analysis systems
are able to know if an IP address is a not a TOR IP address (regular IP address) or TOR exit Node. I think
you know why. I return to my above analysis, think for a moment about the project
Intelligence services can easily create fake web pages that are tailored to the target user’s interest, which
direct the target user to other methods to visit them, or these web pages are hosted on
Do governments and intelligence services possess
This method works either by physically accessing a computer system or by accessing the system remotely
after locating a security hole that allows remote control and installation of monitoring software such as a
The philosophy is often stated that if the user visits a website that uses encryption (https) then it is impossible
to locate the real visitor behind TOR, while if a website is visited that does not support encryption method
(http) it is possible to reveal the real visitor behind TOR.
Conclusion
In conclusion, we can say that the TOR network is a secure anonymous web browsing network that
offers a degree of anonymity to users who use it, but anonymity that is visible to ordinary users and not to
governments and intelligence services. who know the ways and have the methods to penetrate into it. The
TOR network is a completely secure network in the eyes of ordinary users. In a world where
Bibliography
Hi!
We're here to answer your questions!
Send us a message via Whatsapp, and we'll reply the moment we're available!