Advanced Deanonymization Attacks

95 views
Skip to first unread message

Patrick Schleizer

unread,
Aug 23, 2016, 10:44:09 AM8/23/16
to cyphe...@cpunks.org, qubes...@googlegroups.com
A number of advanced deanonymization attacks. These do not just apply to
Whonix, but any anonymity system. Some are also general security issues.

Rather than exploiting bugs in the hypervisor to break out, some of
these attacks rely on the design of the underlying hardware to bypass
privilege separation boundaries and extract (or leak) sensitive
information to the network. No need for alarm, there are many
qualifications to this and details in the listed tickets on proposed
countermeasures. We are interested in cooperation to better assess the
performance impact of the planned fixes.

- Keystroke Deanonymization: [1]

- Advanced Attacks Meta ticket: [2]

-- CPU-induced latency Covert Channel: [3]

-- Cross-VM cache attacks countermeasures: [4]

-- DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks: [5]

-- TCP ISNs and Temperature induced clock skews: [6]

Cheers,
Patrick

[1] https://phabricator.whonix.org/T5421
[2] https://phabricator.whonix.org/T5401
[3] https://phabricator.whonix.org/T530
[4] https://phabricator.whonix.org/T539
[5] https://phabricator.whonix.org/T541
[6] https://phabricator.whonix.org/T543

J.M. Porup

unread,
Aug 23, 2016, 10:49:16 AM8/23/16
to Patrick Schleizer, qubes...@googlegroups.com
On Tue, Aug 23, 2016 at 02:44:00PM +0000, Patrick Schleizer wrote:
> A number of advanced deanonymization attacks. These do not just apply to
> Whonix, but any anonymity system. Some are also general security issues.
>
these first two links returned 404. I'm guessing these are the correct
links:

[1] https://phabricator.whonix.org/T542
[2] https://phabricator.whonix.org/T540

cheers
jmp

Patrick Schleizer

unread,
Aug 23, 2016, 12:16:30 PM8/23/16
to qubes...@googlegroups.com
J.M. Porup:
Yes, thank you!

Reply all
Reply to author
Forward
0 new messages