{"guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","title":"Tor de-anonymization techniques","subtitle":"How people have lost their anonymity? Let's study real-world cases and try to learn how to avoid these errors.","slug":"SHA2017-102-tor_de-anonymization_techniques","link":"https://c3voc.de","description":"Tor offers great anonymity and privacy for millions of people. However, there are some Tor de-anonymization techniques that work. This presentation demonstrates de-anonymization of Tor hidden services and users.\n#NetworkSecurity","original_language":"eng","persons":["Juha Nurmi"],"tags":["SHA2017","102"],"view_count":1063,"promoted":false,"date":"2017-08-05T00:00:00.000+02:00","release_date":"2017-08-05T02:00:00.000+02:00","updated_at":"2026-03-14T14:15:05.312+01:00","length":3666,"duration":3666,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/102-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/102-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/2dd16bb3-657b-41b6-bdec-987ada3f285c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/2dd16bb3-657b-41b6-bdec-987ada3f285c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-102-tor_de-anonymization_techniques","url":"https://api.media.ccc.de/public/events/2dd16bb3-657b-41b6-bdec-987ada3f285c","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":2269,"event_guid":"C4w30id6HpMnzKM2xcrT4g","weight":11},{"event_id":4238,"event_guid":"9ea86f2f-b236-431f-9027-8b31c0b2ad56","weight":19},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":57},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":13},{"event_id":4243,"event_guid":"c678a194-0d4a-42a2-b4ef-b19a83459f4c","weight":17},{"event_id":4249,"event_guid":"98f8267c-cad1-4d04-8a52-f7e979e68c00","weight":12},{"event_id":4255,"event_guid":"ddb12e13-2fb7-4499-bf28-38db6143aa4b","weight":24},{"event_id":4257,"event_guid":"9f3c556d-5cb0-4b17-a099-3c4626a7e83b","weight":13},{"event_id":4258,"event_guid":"ce7ba341-f44e-4f82-9f67-45e2df6b9c67","weight":11},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":15},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":33},{"event_id":4265,"event_guid":"9ba5a35b-0608-40f1-84ec-e02c387cb60b","weight":21},{"event_id":4273,"event_guid":"abd8b143-a3d8-4655-bd1c-a355a0bd5d8d","weight":13},{"event_id":4284,"event_guid":"d23d5053-0684-4342-a0a4-7cfc4cd2afe3","weight":31},{"event_id":4300,"event_guid":"d48d1713-333b-4515-b56d-bc12fa2d3c44","weight":15},{"event_id":4303,"event_guid":"384839be-beef-4ae4-939f-3c2046199c2b","weight":15},{"event_id":4311,"event_guid":"1159379e-b387-4660-a160-d996c7383c5a","weight":12},{"event_id":4351,"event_guid":"06f3958c-0e2c-4dfc-804c-9493fae7fe9b","weight":13},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":16},{"event_id":4362,"event_guid":"67b3b3d4-6098-4694-896c-3e6f76b400d7","weight":11},{"event_id":4374,"event_guid":"22c3d7ca-e490-40d1-b0e4-d321392d53ad","weight":11},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":16}],"recordings":[{"size":302,"length":3666,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-102-eng-Tor_de-anonymization_techniques_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-05T21:59:13.865+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-hd/SHA2017-102-eng-Tor_de-anonymization_techniques_hd.mp4","url":"https://api.media.ccc.de/public/recordings/17580","event_url":"https://api.media.ccc.de/public/events/2dd16bb3-657b-41b6-bdec-987ada3f285c","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":104,"length":3666,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-102-eng-Tor_de-anonymization_techniques_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-05T22:27:50.298+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-sd/SHA2017-102-eng-Tor_de-anonymization_techniques_sd.mp4","url":"https://api.media.ccc.de/public/recordings/17593","event_url":"https://api.media.ccc.de/public/events/2dd16bb3-657b-41b6-bdec-987ada3f285c","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":55,"length":3651,"mime_type":"audio/mpeg","language":"eng","filename":"SHA2017-102-eng-Tor_de-anonymization_techniques.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-05T22:28:41.334+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/mp3/SHA2017-102-eng-Tor_de-anonymization_techniques.mp3","url":"https://api.media.ccc.de/public/recordings/17596","event_url":"https://api.media.ccc.de/public/events/2dd16bb3-657b-41b6-bdec-987ada3f285c","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":46,"length":3651,"mime_type":"audio/opus","language":"eng","filename":"SHA2017-102-eng-Tor_de-anonymization_techniques.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-05T22:29:24.604+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/opus/SHA2017-102-eng-Tor_de-anonymization_techniques.opus","url":"https://api.media.ccc.de/public/recordings/17599","event_url":"https://api.media.ccc.de/public/events/2dd16bb3-657b-41b6-bdec-987ada3f285c","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":123,"length":3666,"mime_type":"video/webm","language":"eng","filename":"SHA2017-102-eng-Tor_de-anonymization_techniques_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-05T22:34:09.707+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-sd/SHA2017-102-eng-Tor_de-anonymization_techniques_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/17606","event_url":"https://api.media.ccc.de/public/events/2dd16bb3-657b-41b6-bdec-987ada3f285c","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":338,"length":3666,"mime_type":"video/webm","language":"eng","filename":"SHA2017-102-eng-Tor_de-anonymization_techniques_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-06T01:40:38.734+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-102-eng-Tor_de-anonymization_techniques_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/17644","event_url":"https://api.media.ccc.de/public/events/2dd16bb3-657b-41b6-bdec-987ada3f285c","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"}]}