• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCybersecurity

Vulnerability could make Tor, the anonymous network, less anonymous

Barb Darrow
By
Barb Darrow
Down Arrow Button Icon
Barb Darrow
By
Barb Darrow
Down Arrow Button Icon
July 29, 2015, 5:27 PM ET
Person wears a Guy Fawkes mask which today is a trademark and symbol for the online hacktivist group Anonymous. 2012.
Person wears a Guy Fawkes mask which today is a trademark and symbol for the online hacktivist group Anonymous. 2012. (Photo by: PYMCA/UIG via Getty Images)Photograph by PYMCA/UIG via Getty Images

The Tor network—used by activists, journalists, law enforcement, and yes, criminals—is famous for cloaking web surfers’ identities and locations. And, apparently, it contains a vulnerability that poses a risk to all that protective anonymity, according to researchers at MIT and the Qatar Computing Research Institute (QCRI).

The good (or bad) news—depending on how you view Tor— is they say they’ve also come up with a fix to the problem that they will demonstrate at the Usenix Security Symposium next month, according to an MIT News story “Shoring up Tor.”

An estimated 2.5 million people—including journalists, political activists, terrorists or just consumers who don’t want to share their browsing histories with Facebook or other commercial entities—use Tor daily. And that is why the network is of keen interest not only to “repressive” regimes like Russia and Iran but to governments a lot closer to home, including our own. Not to put too fine a point on this, but one person’s activist could be another person’s terrorist, but I digress.

DigitalTrends has a good description of the Tor basics:

Tor works by anonymizing the transport of your data. Like an onion, Tor encrypts the data you send through the web in multiple layers. Your data is then “relayed” through other computers. Each relay sheds one layer then finally arrives at the source in full form. The software bounces users around a network of open connections run by volunteers all over the globe. This prevents people from spying on your Internet connection and discovering sites you visit. Tor scrambles information that could pinpoint your exact physical location.

By using a Tor-configured browser, the user enters her request, and it is automatically swaddled in those encryption layers and is sent it to the next, randomly chosen machine that runs Tor. This machine, called “the guard,” peels off the first encryption layer and forwards the still-masked request on until it finally reaches a randomly chosen “exit” machine that strips off the final layer encryption to reveal the destination.

Only the guard machine knows the sender and only the exit machine knows the requested site; no single computer knows both.

The network also offers “hidden services” that enable an activist to aggregate sensitive news reports and make them available to select users, but not the world at large. That is, the archive is not searchable or available on the public Internet.

The creation of those collection points, which involves the building of what Tor calls a “circuit” of machines, offered the researchers a way to snoop on Tor. By connecting a ton of their own machines to the network and then analyzing traffic, they were able to identify likely guard machines.

From the MIT report:

The researchers showed that simply by looking for patterns in the number of packets passing in each direction through a guard, machine-learning algorithms could, with 99 percent accuracy, determine whether the circuit was an ordinary Web-browsing circuit, an introduction-point circuit, or a rendezvous-point circuit. Breaking Tor’s encryption wasn’t necessary.

Furthermore, by using a Tor-enabled computer to connect to a range of different hidden services, they showed that a similar analysis of traffic patterns could identify those services with 88 percent accuracy. That means that an adversary who lucked into the position of guard for a computer hosting a hidden service, could, with 88 percent certainty, identify it as the service’s host.

The researchers, including Albert Kwon, an MIT graduate student in electrical engineering and computer science, and Mashael AlSabah, assistant professor of computer science at Qatar University, and a QCRI researcher, said the fix lies in obscuring data traffic patterns to and from the guard machines in a way that renders such “traffic fingerprinting” ineffective.

If the network sends around enough dummy packets so that all the data sequences look the same to prying eyes, problem solved, and anonymity remains safe.

Sign up for Data Sheet, Fortune’s daily newsletter about the business of technology.

 

About the Author
Barb Darrow
By Barb Darrow
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.


Most Popular

placeholder alt text
Retail
Trump just declared December 26th a national holiday. What's open and closed?
By Dave SmithDecember 26, 2025
2 days ago
placeholder alt text
Success
As millions of Gen Zers face unemployment, CEOs of Amazon, Walmart, and McDonald's say opportunity is still there—if you have the right mindset
By Preston ForeDecember 26, 2025
2 days ago
placeholder alt text
Future of Work
Malcolm Gladwell tells young people if they want a STEM degree, 'don’t go to Harvard.' You may end up at the bottom of your class and drop out
By Sasha RogelbergDecember 27, 2025
1 day ago
placeholder alt text
Europe
Christmas 500 years ago was a drunken 6-week feast that may have been considerably better than the modern holiday, medieval historian says
By Bobbi Sutherland and The ConversationDecember 25, 2025
3 days ago
placeholder alt text
Politics
Peter Thiel and Larry Page are preparing to flee California in case the state passes a billionaire wealth tax, report says
By Jason MaDecember 27, 2025
19 hours ago
placeholder alt text
Banking
Russian official warns a banking crisis is possible amid nonpayments. 'I don’t want to think about a continuation of the war or an escalation'
By Jason MaDecember 27, 2025
16 hours ago

Latest in Tech

Innovationspace
NASA’s upcoming moonshot may let astronauts be the first to lay eyes on parts of the lunar far side that were missed by the Apollo program
By Marcia Dunn and The Associated PressDecember 28, 2025
11 minutes ago
Arts & EntertainmentGen Z
Gen Zers and millennials flock to so-called analogs islands ‘because because so little of their life feels tangible’
By Michael Liedtke and The Associated PressDecember 28, 2025
22 minutes ago
Sridhar Ramaswamy is CEO of Snowflake, the AI Data Cloud company.
CommentarySoftware
Snowflake CEO: Big Tech’s grip on AI will loosen in 2026 — plus 6 more predictions that will define the year
By Sridhar RamaswamyDecember 28, 2025
2 hours ago
Sam Altman, chief executive officer of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, US, on Tuesday, Sept. 23, 2025.
AISam Altman
OpenAI CEO Sam Altman says he is ‘envious’ of Gen Z college dropouts who have the ‘mental space’ and time to build new startups
By Nino PaoliDecember 28, 2025
2 hours ago
InvestingMutual Funds
Brutal year for stock picking spurs trillion-dollar fund exodus
By Isabelle Lee, Alexandra Semenova and BloombergDecember 27, 2025
16 hours ago
Innovationspace
Blue Origin names Tory Bruno to new national security group
By Loren Grush and BloombergDecember 27, 2025
16 hours ago