Index/Organizations/USENIX

USENIX

Organization supporting operating system research

Fact-Checks

7 results
Nov 24, 2025
Most Viewed

How did law enforcement attribution operations and honeypot strategies evolve to deanonymize or identify Tor hidden services during 2020–2025?

Between 2020–2025 law‑enforcement and research techniques to unmask Tor hidden services evolved along two parallel tracks: continued use and refinement of traffic‑analysis and relay‑control methods (i...

Nov 17, 2025
Most Viewed

How effective are deanonymization techniques (traffic correlation, timing attacks) against Tor users?

Traffic-correlation and timing-style deanonymization attacks against Tor are well-documented and can succeed under realistic conditions — particularly when an adversary can observe or control both end...

Jan 19, 2026
Most Viewed

Have any government transparency reports or court filings named techniques used to intercept or circumvent Apple Private Relay?

No government transparency report or court filing in the provided sources explicitly names operational techniques for intercepting or circumventing Apple’s iCloud Private Relay; instead, the public re...

Dec 12, 2025

What techniques can law enforcement use to deanonymize Tor users in 2025?

Law enforcement in 2025 uses a mix of network-level traffic analysis, running or controlling Tor relays, malware/forensic operations and open-source intelligence — each effective only under specific c...

Jan 27, 2026

Is it true data recovery from broken NAND chips is impossible?

It is not categorically impossible to from broken NAND chips, but in practice a hairline crack or severe physical damage usually makes reliable recovery effectively impossible for most labs and consum...

Dec 31, 2025

What defensive practices reduce the chance of deanonymization when using Tor and related tools?

Defending against deanonymization on Tor requires both protocol-aware choices (use current Tor software, entry-guard discipline, and onion services where appropriate) and strict operational hygiene (a...

Dec 4, 2025

How do operating system DNS settings (like systemd-resolved or DNS cache) create leaks with Tor?

Operating-system DNS services like systemd-resolved, nscd and other system caches can cause DNS queries to bypass Tor’s SOCKS proxy and be sent to local or ISP resolvers, producing the classic “DNS le...