Menu
Black Hat presentation on TOR suddenly cancelled

Black Hat presentation on TOR suddenly cancelled

The presentation revolved around de-anonymizing users of the privacy tool

A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.

The talk was nixed by the legal counsel with Carnegie Mellon's Software Engineering Institute after a finding that materials from researcher Alexander Volynkin were not approved for public release, according to a notice on the conference's website.

It's rare but not unprecedented for Black Hat presentations to be cancelled. It was not clear why lawyers felt Volynkin's presentation should not proceed.

Volynkin, a research scientist with the university's Computer Emergency Response Team (CERT) was due to give a talk entitled "You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget" at the conference, which take places Aug. 6-7 in Last Vegas.

TOR is short for The Onion Router, which is a network of distributed nodes that provide greater privacy by encrypting a person's browsing traffic and routing that traffic through random proxy servers. Although originally developed by the U.S. Naval Research Laboratory, it is now maintained by The TOR Project.

TOR is widely used by both cybercriminals and those with legitimate interests in preserving their anonymity, such as dissidents and journalists. Although TOR masks a computer's true IP address, advanced attacks have been developed that undermine its effectiveness.

Some of Volynkin's materials were informally shared with The TOR Project, a nonprofit group that oversees the TOR, wrote Roger Dingledine, a co-founder of the organization, in mailing list post on Monday.

The TOR Project did not request the talk to be canceled, Dingledine wrote. Also, the group has not received slides or descriptions of Volynkin's talk that go beyond an abstract that has now been deleted from Black Hat's website.

Dingledine wrote that The TOR Project is working with CERT to do a coordinated disclosure around Volynkin's findings, possibly later this week. In general, the group encourages researchers to responsibly disclose information about new attacks.

"Researchers who have told us about bugs in the past have found us pretty helpful in fixing issues and generally positive to work with," Dingledine wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securityCarnegie Mellon UniversityThe TOR Project

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments