[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

The Democrats Are Literally Making Stuff Up!

Turn Dead Dirt Into Living Soil With IMO 4

Michael Knowles: Trump & Israel, Candace Owens, and Why Christianity Is Booming Despite the Attacks

Save Canada's Ostrich Farms! Protests Erupt Over Government Tyranny in Canada

Holy SH*T! Poland just admitted the TRUTH about Zelensky and it's not good

Very Alarming Earthquakes Strike As We Enter The Month Of September

Billionaire Airbnb Co-Founder Reveals Why He Abandoned Democrat Party For Trump

Monsoon floods devastate Punjab’s crops, (1.7 billion people) at risk of food crisis

List Of 18 Things That Are Going To Happen Within The Next 40 Days

Pentagon Taps 600 Military Lawyers To Serve As Temporary Immigration Judges For DOJ

81 Actors Who Have Passed Away So Far in 2025

High school is different now

Banks REMOVING CASH and nearing major DISASTER. Prof St Onge.

Did America Pick the Wrong Side in WWII?

Chicago in CHAOS – Mayor Tells Police to Stand Down as Trump Says ENOUGH Murder

Graham Linehan ARRESTED in UK for gender critical tweets - UK COLLAPSE IS IMMINENT

Cash Jordan: 400,000 Illegals ‘Forcibly Returned’ To Mexico… as NYC COLLAPSES

The ChatGPT CEO's Web Of Lies by Vanessa Wingardh

The Fall of the Israel Lobby Has Begun — And This Is Just the Start | Denzel Washington speech

'Statistically Almost Impossible' – 4 AfD Candidates Have Died 'Suddenly And Unexpectedly' Before Key State Election

Israel And The West Set The Stage For Next Round Of Warfare On Iran

Last night in Milan, an 18-year-old girl was beaten and raped while trying to catch a train home

Russia has developed a truly modern system of warfare.

Alberta's Independence and Finances

Daniela Cambone: 100% Loan Losses Loom as Fed Shrinks Balance Sheet-

Tucker Carlson

Cash Jordan: ICE HALTS 'Invasion Convoy'... ESCORTS 'Armada' of Illegals BACK to MEXICO

Cash Jordan: “We’re Coming In"... Migrant Mob ENTERS ICE HQ, Get ERASED By 'Deportation Unit'

Opioids More Likely To Kill Than Car Crashes Or Suicide

The association between COVID-19 “vaccines” and cognitive decline


Resistance
See other Resistance Articles

Title: How the way you type can shatter anonymity—even on Tor
Source: arstechnica
URL Source: http://arstechnica.com/security/201 ... shatter-anonymity-even-on-tor/
Published: Jul 28, 2015
Author: Dan Goodin
Post Date: 2015-08-03 17:41:29 by X-15
Keywords: None
Views: 107
Comments: 4

Security researchers have refined a long-theoretical profiling technique into a highly practical attack that poses a threat to Tor users and anyone else who wants to shield their identity online.

The technique collects user keystrokes as an individual enters usernames, passwords, and other data into a website. After a training session that typically takes less than 10 minutes, the website—or any other site connected to the website—can then determine with a high degree of certainty when the same individual is conducting subsequent online sessions. The profiling works by measuring the minute differences in the way each person presses keys on computer keyboards. Since the pauses between keystrokes and the precise length of time each key is pressed are unique for each person, the profiles act as a sort of digital fingerprint that can betray its owner's identity.

The prospect of widely available databases that identify users based on subtle differences in their typing was unsettling enough to researchers Per Thorsheim and Paul Moore that they have created a Chrome browser plugin that's designed to blunt the threat. The plugin caches the input keystrokes and after a brief delay relays them to the website in at a pseudo-random rate. Thorsheim, a security expert who organizes the annual PasswordsCon conference, and Moore, an information security consultant at UK-based Urity Group, conceived the plugin after thinking through all the ways the typing profiles could be used to compromise online anonymity.

Profiling Tor users

"The risk may seem small when you consider one single website collecting this type of information," Runa Sandvik, an independent security researcher and former Tor developer, told Ars. "The real concern with behavioral profiling is when it is being done by multiple big websites owned by the same company or organization. The risk to anonymity and privacy is that you can profile me and log what I am doing on one page and then compare that to the profile you have built on another page. Suddenly, the IP address I am using to connect to these two sites matters much less."

Sandvik said she visited this profiling demo site using a fully updated Tor browser, and the site was able to construct a profile of her unique typing habits. That means Tor-anonymized websites—either because their operators are malicious or are cooperating with law enforcement agencies—can use similar profiling scripts that track people across both public and darkweb destinations. While the Tor browser limits the amount of JavaScript that sites can run, it allowed all the code needed to make the demo profiling app work during Sandvik's experiment. Had JavaScript been disabled altogether, the profiling would have been blocked. So while blocking JavaScript is useful, that approach might not make a difference against a profiling app that found a means other than JavaScript to measure typing characteristics.

The gathering of unique keystroke characteristics is an example of what's known as behavioral biometrics, or the measurement of something a person does, such as speaking, walking, or typing. So far, Thorsheim and Moore say, several banking websites appear to be using keystroke profiling to perform an additional layer of authentication on site users. In theory, such an approach could allow the sites to detect account hijackings, even when the attacker enters the correct username and password. Given the potential benefit of behavioral biometrics, the Chrome plugin can whitelist specific websites that are using it for good. (Moore has more about the extension here.)

To be fair, behavioral biometrics is by no means a new field of study. As evidenced by this Slashdot thread from 2007, people have long recognized the potential of using it to identify people behind a keyboard. There's also a huge library of research papers showing how to profile and de-anonymize browsers connecting over Tor. Still, if banks and other sites can use the technique to create reliable and accurate profiles of customers, it stands to reason that governments around the world can and do profile people of interest.

"As soon as somebody manages to build a biometric profile of your keystrokes at a network/website where you are otherwise completely anonymous, that same profile can be used to identify you at other sites you're using, where identifiable information is available about you," Thorsheim wrote in a blog post published Tuesday. "Your favorite government agency—pick your country—could set up spoofed and fake pages on the darkweb as well as in the real world, in order to identify people across them. For oppressive regimes, this is most certainly of high interest."


Poster Comment:

Important embedded links at article!!!!!

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: X-15 (#0)

Thanks! maybe they'll write an app for Firefox soon.

“The most dangerous man to any government is the man who is able to think things out... without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane, intolerable.” ~ H. L. Mencken

Lod  posted on  2015-08-03   17:58:40 ET  Reply   Trace   Private Reply  


#2. To: Lod (#1)

an app for Firefox soon.

Is it not obvious that anyone using GOOGLE Chrome is really not all that interested in privacy?

"When plunder becomes a way of life for a group of men living together in society, they create for themselves in the course of time a legal system that authorizes it and a moral code that glorifies it." - Frederic Bastiat

Southern Style  posted on  2015-08-03   18:51:23 ET  Reply   Trace   Private Reply  


#3. To: Southern Style (#2)

Is it not obvious that anyone using GOOGLE Chrome is really not all that interested in privacy?

Game, set, match.

“The most dangerous man to any government is the man who is able to think things out... without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane, intolerable.” ~ H. L. Mencken

Lod  posted on  2015-08-03   19:28:05 ET  Reply   Trace   Private Reply  


#4. To: X-15 (#0)

Behavioral biometrics -- where's the bottom?

Wish I could say any of the google alternatives were near as good.

NeoconsNailed  posted on  2015-08-03   22:04:37 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]