Researchers Find a Way to Scoop Unencrypted Tor Network Traffic Data

  • Improperly implemented Tor network code on mobile devices results in the leaking of people’s PII.
  • Deloitte researchers have managed to profile people, find their GPS coordinates, and capture their keystrokes.
  • For now, the OEMs responsible for this have not been exposed to the public, but have not done anything about it either.

According to Adam Podgorski and Milind Bhargava, two researchers working for Deloitte Canada, there is a way to harvest unencrypted Tor network data from exit nodes, and then piece the data fragments together. The two claim to have managed to do just that and tapped into people’s PII (personally identifiable information). This is something that virtually all Tor users would consider impossible, but in the mobile space, things can be different. The data that the researchers managed to piece together include GPS coordinates, web addresses, browsing habits, phone numbers, IMEI numbers, IMSI numbers, and even keystrokes that can derive from any application on the phone.

As we said, all of this happens on mobile devices, including both Android (95%) and iOS (5%) systems. As the researchers point out, Tor code is somehow installed on these mobile phones, most probably by applications that have taken Orbot code and incorporated into their solutions. The developers of these apps probably maintain the idea that Tor traffic is automatically encrypted traffic, but that is not really the case with HTTP. For now, the researchers are not disclosing the names of the apps, OEMs, and advertisers who are responsible for these sensitive data leaks, but they are calling them “popular in both Asia and North America”.

As expected, the researchers reached out to these OEMs and developers to inform them of the issue, but they have not received any response yet. Still, it would be too dangerous to disclose many details at this point, as that would render a large number of users vulnerable. To make matters worse, there’s nothing that the users can do to protect themselves from this problem, especially in the cases of OEM-installed software tools, as these can’t be removed.

The researchers prepared a proof of what they could do in the form of user profiling, including GPS coordinates, keystroke data, and IMSI details, hoping to convince the entities responsible to do the right thing now. Those accountable for the situation will not stay on the safe side for much longer, as there are multiple GDPR violations involved in what is going on right now. That said, government and data protection organizations are bound to take action against these OEMs very soon.

Have something to comment on the above? Feel free to share your thoughts with us in the section down below, or on our socials, on Facebook and Twitter

REVIEW OVERVIEW

Latest

How to Watch The Chi Season 5 Online From Anywhere

A new season of The Chi will premiere soon, and you will be able to stream all the episodes online quite easily...

How to Watch the 2022 Glastonbury Festival Online for FREE From Anywhere

One of the world's favorite music festivals reached its 50th edition, and if you weren't among the lucky fans to secure a...

How to Watch 49th Annual Daytime Emmy Awards 2022 Online From Anywhere

This year's 49th Annual Daytime Emmy Awards are poised to premiere soon, and we love to tell you that you'll be able...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari