Flaws Could Expose Users of Privacy-Protecting Software: Researchers

Advertisement
By Reuters | Updated: 24 July 2014 22:09 IST
Researchers have found a flaw that could expose the identities of people using a privacy-oriented operating system touted by Edward Snowden, just two days after widely used anonymity service Tor acknowledged a similar problem.

The most recent finding concerns a complex, heavily encrypted networking program called the Invisible Internet Project, or I2P. Used to send messages and run websites anonymously, I2P ships along with the specialized operating system "Tails," which former U.S. spy contractor Snowden used to communicate with journalists in secret.

Though a core purpose of I2P is to obscure the Internet Protocol addresses of its roughly 30,000 users, anyone who visits a booby-trapped website could have their true address revealed, making it likely that their name could be exposed as well, according to researchers at Exodus Intelligence.

"People shouldn't trust something wholeheartedly just because Snowden says," Exodus Vice President Aaron Portnoy told Reuters. "Generally, we assume the things we can find, others can find."

Tails launches from a DVD or USB stick and is designed to maintain privacy even when a computer or network has been hacked.

(Also see: Snowden Seeks to Develop Anti-Surveillance Technologies)

Much more than I2P, Tails relies on Tor, the better-known anonymity system that it uses for all software connections to the Internet. But leaks in the past year have shown that Tor is also a major target for the U.S. National Security Agency and others, and researchers at Carnegie Mellon University said they could have identified hundreds of thousands of Tor users.

Those researchers planned to detail their technique next month at the security conference Black Hat. After Tor developers complained to Carnegie Mellon, the university told Black Hat to cancel the talk.

Tor programmer Roger Dingledine conceded that the researchers had found a flaw, and he said his team was now working to fix it before any public disclosure exposes dissidents and other types of users on Tor to greater risk of attack.

The I2P flaw will likewise be fixed, in what a spokesman for the I2P project called the "near future." In the meantime, he said, users should disable the programming language JavaScript.

Tails did not respond to an email seeking comment. It was not clear how many Tails users would be vulnerable, since the I2P application does not launch automatically when the operating system is opened. The I2P spokesman said a user would have to have chosen to run I2P to be vulnerable.

Exodus is one of a dozen or more companies known to sell secret security flaws to intelligence agencies, law enforcement and other customers in a controversial marketplace.

No system is failsafe
But in this case, Exodus alerted I2P and Tails to the problem and said it would not divulge the details to customers until the problem has been fixed. Portnoy declined to say what the company would do if a government client asked him to find a similar flaw in the future.

The Tails and Tor episodes show that no anonymity system is failsafe, Portnoy said, and those in jeopardy should focus on compartmentalizing their efforts so that a single breach would not expose everything about them.

"Tor works for most purposes, but a determined adversary will always find a way," he said.

In one such high-stakes case, the FBI used a flaw in a Firefox Web browser that came bundled with Tor to identify a man suspected of hosting child pornography, according to Irish media reports.

Leaked NSA documents show that the NSA logged the IP addresses of many Tor users and may have scanned emails for users living outside of the United States and its four closest intelligence allies, German media reported this month.

© Thomson Reuters 2014

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Nothing Phone 3a Lite Launched With Glyph Light At This Price
  2. Amazon Fire TV Stick 4K Select Launched in India With Vega OS
  3. Oppo Find X9 Series Confirmed to Be Available in India via Flipkart
  4. Moto G67 Power 5G India Launch Date, Key Features Announced
  5. Vivo X300 Series Price, Key Features Leaked Ahead of Global Launch
  6. Vivo X300 Series Launching Today: Everything You Need to Know
  7. Oppo Enco X3s Launched With 55dB ANC, Up to 45 Hours Total Battery Life
  8. Nothing Phone 3a Lite Launch Today: Everything You Need to Know
  9. TRAI, DoT Approve Presentation of Caller Names During Incoming Calls
  1. Vivo X300 Series Launching Today: Know Price, Features and Specifications
  2. NASA’s X-59 Supersonic Jet Takes Historic First Flight, Paving Way for Quiet Supersonic Travel
  3. ASIC Clarifies Crypto Rules; Stablecoins, Tokenised Assets Flagged as Financial Products
  4. SpaceX Launches 28 Starlink Satellites, Lands Falcon 9 Booster in Pacific
  5. Idli Kadai, Starring Dhanush, Now Streaming on Netflix: What You Need to Know
  6. Ideabaaz Now Streaming on ZEE5: Everything You Need to Know
  7. Grey’s Anatomy Season 22 OTT Release: Know Where to Watch it Online?
  8. Bad Girl OTT Release Date: When and Where to Watch Tamil Drama Online?
  9. Adobe Partners With Google Cloud to Integrate Frontier AI Models Across Its Platforms
  10. Vivo X300, Vivo X300 Pro Price and Key Specifications Leaked Ahead of Global Launch
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.