Tag Archive for: Researchers

Researchers claim they’ve developed a better, faster Tor

Tor, the world’s largest and most well-known “onion router” network, offers a degree of anonymity that has made it a popular tool of journalists, dissidents, and everyday Internet users who are trying to avoid government or corporate censorship (as well as Internet drug lords and child pornographers). But one thing that it doesn’t offer is speed—its complex encrypted “circuits” bring Web browsing and other tasks to a crawl. That means that users seeking to move larger amounts of data have had to rely on virtual private networks—which while they are anonymous, are much less protected than Tor (since VPN providers—and anyone who has access to their logs—can see who users are).

A group of researchers—Chen Chen, Daniele Enrico Asoni, David Barrera, and Adrian Perrig of the Swiss Federal Institute of Technology (ETH) in Zürich and George Danezis of University College London—may have found a new balance between privacy and performance. In a paper published this week, the group described an anonymizing network called HORNET (High-speed Onion Routing at the NETwork layer), an onion-routing network that could become the next generation of Tor. According to the researchers, HORNET moves anonymized Internet traffic at speeds of up to 93 gigabits per second. And because it sheds parts of Tor’s network routing management, it can be scaled to support large numbers of users with minimal overhead, they claim.

Like Tor, HORNET encrypts encapsulated network requests in “onions”—with each layer being decrypted by each node passing the traffic along to retrieve instructions on where to next send the data. But HORNET uses two different onion protocols for protecting anonymity of requests to the open internet and a modified version of Tor’s “rendezvous point” negotiation for communication with a site concealed within the HORNET network.

Read 6 remaining paragraphs | Comments


Ars Technica » Technology Lab

Researchers disclose four unpatched vulnerabilities in Internet Explorer

Security researchers published limited details about four unpatched vulnerabilities in Internet Explorer because Microsoft has not moved quickly enough to fix them.

The flaws could potentially be exploited to execute malicious code on computers when users visit compromised websites or open specially crafted documents. They were reported through Hewlett-Packard’s Zero Day Initiative (ZDI) program.

HP’s TippingPoint division, which sells network security products, pays researchers for information on unpatched high-risk vulnerabilities in popular software. The company uses the information to create detection signatures, giving it a competitive advantage, but also reports the flaws to the affected vendors so they can be fixed.

To read this article in full or to leave a comment, please click here

Network World Security

Baby, you can hack my car: researchers take over a Jeep from 10 miles away

Two renowned security researchers have discovered a way to remotely hack into and take over a Jeep Cherokee, controlling the brakes and accelerator as well as other components.
Naked Security – Sophos

Researchers sound alarm about the role of any and all phone sounds in distracted driving

You say you don’t answer your phone and wouldn’t dream of texting while driving?

Not good enough, say researchers from Florida State University, as the mere presence of that cacophonous device in a moving motor vehicle is enough to dangerously distract a driver:

Whether you are alerted to an incoming phone call or text by a trendy ringtone, an alarm bell or a quiet vibration, just receiving a notification on your cell phone can cause enough of a distraction to impair your ability to focus on a given task, according to a new Florida State University study.

In fact, the distraction caused by a simple notification — whether it is a sound or a vibration — is comparable to the effects seen when users actively use their cell phones to make calls or send text messages, the researchers found.

To read this article in full or to leave a comment, please click here

Network World Paul McNamara