Jan 032017
 January 3, 2017  Posted by  Breaches, Featured News, Online, Surveillance

Catalin Cimpanu reports:

Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser can deanonymize Tor users by making nearby phones or computers send identity beacons back to advertisers, data which contains sensitive information that state-sponsored actors can easily obtain via a subpoena.

This attack model was brought to light towards the end of 2016 by a team of six researchers, who presented their findings at the Black Hat Europe 2016 security conference in November and the 33rd Chaos Communication Congress held last week.

Read more on Bleeping Computer.

Sorry, the comment form is closed at this time.