Tor network vulnerable to NSA spying

Status
Not open for further replies.

BoraMurdar

Community Manager
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
In the wake of the NSA spying program, it appears that the network may not be as private as we thought. Robert Graham, a security researcher, has concluded that three quarters of all Tor nodes use only 1024-bit Diffie-Hellman keys, and it's generally agreed upon that the NSA can crack these keys in hours using dedicated hardware. The latest release candidate for Tor, version 2.4, switches from the standard Diffie-Hellman key exchange to ECDHE, which are Elliptical-Curve Diffie-Hellman keys, which may greatly increase the privacy of the Tor network. Unfortunately, this version is not yet finalized and may not be as stable as the current release.

Of course there's no guarantee that the NSA hasn't already found an easy way to crack ECDHE, but considering it's not currently as common as other encryption techniques, for now there's a greater chance that it's more secure.

source
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top