

Norte makes clear that this method requires “controlled environments.” In other words, it could work well in a laboratory, but it might be much harder to identify a Tor user this way in the real world. With enough data from both sources, it would become possible to determine the real identify of an Internet user even if he is connecting to certain sites using Tor.ĭon’t panic yet. They would only make it possible to trace a Tor user’s activity across different sites.īut the real danger comes from the possibility that mouse patterns inside the Tor browser could be matched with those that a user makes when visiting a website from a normal browser, which does expose his true IP address.

On their own, mouse movements inside the Tor browser wouldn’t reveal a user’s true IP address. By default, the Tor Browser, a specifically modified browser that most people use to access the Tor network, has this turned on - so it’s likely that a large number of Tor users are exposed to this sort of identification method. The method requires only that the user’s Web browser have JavaScript enabled. Jose Carlos Norte, an Internet security researcher, disclosed on his blog earlier this month a technique that monitors mouse movements to keep track of a user’s online activity. That way, no one party can figure out where traffic originated.īut a new Tor privacy loophole has been identified. It does a pretty good job of that by routing traffic through multiple relays (Tor is short for “The Onion Router” because connections are routed through may different layers, like an onion).

Tor is designed to hide your identity on the Internet by making it impossible for websites, or people eavesdropping on network traffic, to determine your true IP address. The latest threat to Tor, the online anonymity tool, is simple but serious: Mouse movements may be used to identify users online.
