There are many ways for your browser and other network traffic to betray your activities; it is not just DNS leaks ya got to be worried about, checkout the browser cache attacks that where shown at the BlackHat convention about two months ago.
Title: I Know Where You've Been: Geo-Inference Attacks... Link: https://www.youtube.com/watch?v=lGb0AACAk1A Also be aware that DNS records are not the only way of linking specific users (or groups behind the same NAT) of a web server or multiple servers over time. Title : DEF CON 18 - Peter Eckersley - How Unique Is Your Browser? Link: https://www.youtube.com/watch?v=OwxhAjtgFo8 Stay safe y'all. On November 2, 2016 10:13:00 AM PDT, sajolida <[email protected]> wrote: >Alec Muffett: >> On 14 Oct 2016 1:29 pm, "Justin" <[email protected]> wrote: >>> Not too long ago, a paper was published that talks about how Tor >users >>> can be deanonymized through their DNS lookups. Is this something I >should >>> be concerned about? >> >> That is an excellent question! What are you doing, and who are you >afraid >> of? :-P > >I bet Justin was referring to [1] which has been announced by its >authors on tor-dev [2] but I couldn't find an analysis of it by the Tor >community (and I don't have the skills to do it myself). > >[1]: https://nymity.ch/tor-dns/tor-dns.pdf >[2]: >https://lists.torproject.org/pipermail/tor-dev/2016-September/011472.html >-- >tor-talk mailing list - [email protected] >To unsubscribe or change other settings go to >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
