From the course: Exploring Tor and the Dark Web

Unlock the full course today

Join today to access over 23,100 courses taught by industry experts.

Circuit shaping

Circuit shaping

- [Instructor] Circuit reconstruction attacks depend upon an adversary compromising large portions of the Tor network and hoping that their target selects a circuit that uses only their nodes. But what if an attacker could control the nodes that a victim selects? And instead of using random nodes, the victim's browser chooses to use only compromised nodes. This is an attack known as circuit shaping. The attacker compromises the victim's computer in some way, and then tampers with their Tor software, causing it to select circuits built exclusively from nodes under the attacker's control. Now, circuit shaping isn't easy. It requires either hacking into the victim's computer and altering the Tor software, or tricking the end user into installing a compromised version of Tor onto the browser. But if it's successful, it would completely undermine the security of all Tor communications from that system. As an end user, the best protection against circuit shaping is strong computer security…

Contents