{"guid":"import-185c5941b7063fd2b7","title":"Security and anonymity vulnerabilities in Tor","subtitle":"Past, present, and future ","slug":"25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor","link":"http://events.ccc.de/congress/2008/Fahrplan/events/2977.en.html","description":"There have been a number of exciting bugs and design flaws in Tor over the years, with effects ranging from complete anonymity compromise to remote code execution. Some of them are our fault, and some are the fault of components (libraries, browsers, operating systems) that we trusted. Further, the academic research community has been coming up with increasingly esoteric – and increasingly effective! – attacks against all anonymity designs, including Tor.\n","original_language":"eng","persons":["Roger Dingledine"],"tags":["25c3"," Hacking"],"view_count":105,"promoted":false,"date":"2008-12-29T01:00:00.000+01:00","release_date":"2009-01-18T01:00:00.000+01:00","updated_at":"2025-04-26T16:45:03.358+02:00","length":3738,"duration":3738,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-185c5941b7063fd2b7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-185c5941b7063fd2b7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor","url":"https://api.media.ccc.de/public/events/import-185c5941b7063fd2b7","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":234,"event_guid":"import-4bb501402746b19864","weight":1},{"event_id":357,"event_guid":"import-7b327b539b6af0f986","weight":1},{"event_id":945,"event_guid":"import-c8564d288716d88de3","weight":1},{"event_id":949,"event_guid":"import-7731036a6ad7782f4f","weight":1},{"event_id":955,"event_guid":"import-2818f218a4456bad05","weight":1},{"event_id":1058,"event_guid":"import-20a6b9aac8f72f4d2c","weight":2},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":1},{"event_id":1175,"event_guid":"import-292594cb78d63e1b71","weight":1},{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":2},{"event_id":1260,"event_guid":"import-f1d0a60134429a1004","weight":1},{"event_id":1275,"event_guid":"import-e2aeeda6438ea858f2","weight":1},{"event_id":1327,"event_guid":"import-34e9b068fe2dc20234","weight":1},{"event_id":1337,"event_guid":"import-cb980fd24831107395","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":1389,"event_guid":"import-5e05e9fcc28e3e5161","weight":1},{"event_id":1427,"event_guid":"import-884b43d141f3f1d521","weight":3},{"event_id":1567,"event_guid":"import-6e1975ef73fbf52e06","weight":2},{"event_id":1716,"event_guid":"import-15e4361b2ab005ddb4","weight":2},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":1},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":1},{"event_id":3322,"event_guid":"eb9e12ac-f668-5906-8dd5-61f15d346484","weight":1},{"event_id":3554,"event_guid":"84e9ccad-5efe-49ac-b117-b382ae6fac1f","weight":1},{"event_id":3597,"event_guid":"87092ad2-d3fd-4a37-bb58-1fe71217a06b","weight":1},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":3691,"event_guid":"c9f7749d-c365-43ad-9869-1f014c9f1f06","weight":1},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":4311,"event_guid":"1159379e-b387-4660-a160-d996c7383c5a","weight":1},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":1},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":1},{"event_id":4858,"event_guid":"12f2dd5b-5e3d-4098-9f10-6c277672b2e0","weight":1}],"recordings":[{"size":478,"length":3738,"mime_type":"audio/ogg","language":"eng","filename":"25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:45.146+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg","url":"https://api.media.ccc.de/public/recordings/2199","event_url":"https://api.media.ccc.de/public/events/import-185c5941b7063fd2b7","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":478,"length":3738,"mime_type":"video/mp4","language":"eng","filename":"25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:31.317+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4","url":"https://api.media.ccc.de/public/recordings/2198","event_url":"https://api.media.ccc.de/public/events/import-185c5941b7063fd2b7","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":478,"length":3738,"mime_type":"video/webm","language":"eng","filename":"25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:31.351+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.webm","url":"https://api.media.ccc.de/public/recordings/2197","event_url":"https://api.media.ccc.de/public/events/import-185c5941b7063fd2b7","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}