Tor Means Eavesdropping Fun

Rogue Nodes Turn Tor Anonymizer Into Eavesdropper’s Paradise:

Tor has a known weakness: The last node through which traffic passes in the network has to decrypt the communication before delivering it to its final destination. Someone operating that node can see the communication passing through this server….

He was surprised to discover that 95 percent of the traffic that passed through his Tor nodes was not encrypted.

Even more surprising was the number of embassies and other government agencies that were using Tor, and using it incorrectly.

That prompted Egerstad to narrow his search to e-mail correspondence with a focus on government agencies. He wrote a script to search for .gov domains and keywords such as “embassy,” “war” and “military,” and focused on sniffing port-25 traffic, the port through which e-mail passes.


Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: