Tor nodes present vulnerability in their network.

avatar

Source

Greetings to all my dear readers and followers of this valuable platform, continuing with my publications today I will share with all of you a very interesting and even alarming topic for users who make life in the world of cryptocurrencies and is that Tor nodes can make that during the operation with BTC can steal you and not only with BTC with any cryptocurrency.

Before starting with the full approach of how these Tor nodes can steal your cryptocurrencies during a transaction we must define what Tor nodes are, by its acronym means The Onion Router this is the best known darknes of internet whose main objective is to create a communications network which is distributed and superimposed on the conventional internet network. It is really surprising how more and more malicious strategies emerge to steal from users so we must be vigilant.

The way to steal your BTC is very simple because when sending the BTC the attacker can change the destination address of the funds using this Tor network, this vulnerability was detected by a user on the Reddit forum named HeoricLife, this user states that he has been receiving reports from customers that the BTC mixers are stealing their coins transferred. A user named HeoricLife detected this vulnerability when receiving reports from customers that BTC mixers are stealing their digital assets.

Source

According to the aforementioned user, the vulnerability is not in the Tor or BTC infrastructure, but in the malicious use of the anonymity network managed by Tor nodes, which allow to hide the information. These attacks seek the vulnerability of online cryptocurrency services, as is the palpable case of the mixers, to avoid these attacks the user recommends changing the HTTP protocols for HTTPS as this presents greater security than its predecessor.

Let's remember that HTTPs are protocols for storing and sending data, so we must be sure that we are using the correct HTTPS protocol, which is the successor of the previous and vulnerable HTTP, which was extinct for being very vulnerable in its security. Based on all this approach, we must be alert to any suspicious situation that puts at risk our operations on the network and thus avoid the loss of our digital assets.

Reference Consulted

Article prepared by:



0
0
0.000
0 comments