Author Topic: Bluebear: Exploring Privacy Threats in BitTorrent  (Read 2732 times)

0 Members and 1 Guest are viewing this topic.

Offline crypton

  • Elite
  • *****
  • Posts: 1699
  • Karma: +10/-0
    • View Profile
Bluebear: Exploring Privacy Threats in BitTorrent
« on: April 09, 2010, 04:01:52 PM »
http://www-sop.inria.fr/members/Arnaud.Legout/Projects/bluebear.html

Spying the World from your Laptop - Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
Quote
Abstract: This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show that a few content providers inject most contents into BitTorrent and that those content providers are located in foreign data centers. We also show that an adversary can compromise the privacy of any peer in BitTorrent and identify the big downloaders that we define as the peers who subscribe to a large number of contents. This infringement on users' privacy poses a significant impediment to the legal adoption of BitTorrent.

http://hal.inria.fr/inria-00470324/en/

http://hal.inria.fr/docs/00/47/03/24/PDF/bt_privacy_LEET10.pdf
http://hal.inria.fr/docs/00/47/03/24/PS/bt_privacy_LEET10.ps


Compromising Tor Anonymity Exploiting P2P Information Leakage .
http://hal.inria.fr/inria-00471556/en/

Quote
Abstract: Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.

http://hal.inria.fr/docs/00/47/15/56/PDF/TorBT.pdf
http://hal.inria.fr/docs/00/47/15/56/PS/TorBT.ps

De-anonymizing BitTorrent Users on Tor.
http://hal.inria.fr/inria-00471177/en/
Quote
Abstract: Some BitTorrent users are running BitTorrent on top of Tor to preserve their privacy. In this extended abstract, we discuss three different attacks to reveal the IP address of BitTorrent users on top of Tor. In addition, we exploit the multiplexing of streams from different applications into the same circuit to link non-BitTorrent applications to revealed IP addresses.

http://hal.inria.fr/docs/00/47/11/77/PDF/btor.pdf
http://hal.inria.fr/docs/00/47/11/77/PS/btor.ps
Quote

Offline echelon

  • Elite
  • *****
  • Posts: 327
  • Karma: +8/-0
    • View Profile
Re: Bluebear: Exploring Privacy Threats in BitTorrent
« Reply #1 on: April 10, 2010, 08:43:50 PM »
Hey

this shows again the badness of the contruct with a exit node.
TOR needs to change itself. But that takes time.

echelon