3c81e77e 9f14 4672 Be39 68371b397126

There is a privacy threat lurking on perhaps hundreds of millions of devices, that could enable potential attackers to track and profile users, by using information leaked via the Tor network, even if the users never intentionally installed Tor in the first place. Learn more in an informative article:

In a session at theSecTorsecurity conference in Toronto, Canada on October 10, researchers Adam Podgorski and Milind Bhargava fromDeloitte Canadaoutlined and demonstrated previously undisclosed research into how they were able to determine that personally identifiable information (PII) is being leaked by millions of mobile users every day over Tor.

The irony of the issue is thatToris a technology and a network that is intended to help provide and enable anonymity for users. With Tor, traffic travels through a number of different network hops to an eventual exit point in the hope of masking where the traffic originated from. Podgorski said that there are some users that choose to install a Tor browser on their mobile devices, but that’s not the problem. The problem is that Tor is being installed by mobile applications without user knowledge and potentially putting users at risk.

The link for this article located at InfoSecurity is no longer available.