Tor is one of the most powerful tools available on the internet to protect your privacy; however, many people still mistakenly believe that Tor is merely an end-to-end encryption tool.
In fact, Tor is used for anonymous browsing of websites and sending emails (but not encrypting the content of the emails).
Anonymous is freedom, it is innocent, but most of the time it is utilized by some illegal transaction sites like Silk Road, so the FBI’s relentless pursuit of Tor users is often considered reasonable. Recently, Tor upgraded to evade the FBI’s persistent pursuit, adding a new layer of encryption that is sure to make the FBI unhappy.
In early June, Tor released version 6.5a1, which is an enhanced version compared to previous releases, incorporating a new random algorithm called Selfrando. Recently, researchers from the University of California, Irvine published a detailed paper on this technology, defining the new algorithm as:
This is an enhanced, practical random loading time technology. Simply put, this technology is more convenient for preventing hackers from de-anonymizing Tor users.
The Tor team and the researchers from the University of California spent a significant amount of time and effort collaborating to develop Selfrando, aiming to replace the traditional address space random loading technology.
The address space random loading technology allows code to be transformed in its running memory, while Selfrando works by separating different functional code and randomly distributing their running memory addresses.
If an attacker cannot accurately guess the memory address where each code executes, they cannot exploit the vulnerabilities present in memory, and thus cannot run their malicious code on the Tor browser, better protecting users’ personal information.
The binary files in Selfrando are built on the same hard drive and are only randomly distributed once loaded into the main memory.
Tor has always made the FBI grind their teeth, and the FBI has tirelessly researched how to break Tor, even spending money to find helpers worldwide, all in an effort to uncover the true identities of Tor users. However, this update from Tor has put the FBI in a tough spot, and how they will catch up now requires finding a reasonable breakthrough point.
Already 60 people signed up! Offline event on June 25!
Using just one WiFi, penetrate the entire corporate intranet
Counting the security improvements in Android N
Using Fluxion to efficiently crack WiFi passwords
BurpSuite plugin development tips: AES encryption and decryption of request response parameters
New malware emerges, capable of pushing banking Trojan services
BadTunnel allows remote hijacking of any intranet host traffic
GeekPwn2016 carnival is coming, recruiting top hackers worldwide starting now
Telegram statement: Hackers have found a way to send large amounts of spam messages
How to write a good penetration test report?
Bitcoin sponsorship donation address: 13sbdFRyFBeqmXY9GJQf66s5cwmvLvWaAD
Long press the public account to “pin“
———————————-
News, insights, original, professional focus on “Black and White Path” WeChat: i77169 Huaxia Hacker Alliance we adhere to freedom, free, sharing!