	{"id":91981,"date":"2020-08-13T17:46:36","date_gmt":"2020-08-14T00:46:36","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91981"},"modified":"2020-08-14T08:42:41","modified_gmt":"2020-08-14T15:42:41","slug":"why-tor-is-bad-for-your-privacy-and-security","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/","title":{"rendered":"Malicious party hijacks 24% of Tor network"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-78070 size-large\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/TORlogo-1024x619.png\" alt=\"\" width=\"600\" height=\"363\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/TORlogo-1024x619.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/TORlogo-150x91.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/TORlogo-300x181.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/TORlogo-768x464.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/TORlogo-657x397.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/TORlogo.png 1275w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>You may have heard of Tor, a distributed network designed to anonymize users&#8217; online activities. While that sounds great for protecting one&#8217;s privacy, Tor has a number of major flaws.<\/p>\n<p>Let&#8217;s briefly review what Tor is, and then let&#8217;s take a look at the most recent research into why it&#8217;s unsafe.<\/p>\n<h3>What is Tor?<\/h3>\n<p>Tor was originally an acronym for The Onion Router.<span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Its main objective is to anonymize online activity.<\/span><\/p>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">The Tor network uses randomly chosen routes, consisting of &#8220;relays&#8221; and &#8220;exit nodes&#8221; offered by many anonymous parties. A relay is a computer that passes on your network requests to another computer on the Tor network. An exit relay, or exit node, is the computer through which your traffic emerges onto the Internet to reach its destination. If you load a Web site through Tor, the Web server will think the exit node&#8217;s IP address is your own computer&#8217;s IP address.<\/span><\/p>\n<h3>Is Tor really private, anonymous, and safe to use?<\/h3>\n<p>There are <a href=\"https:\/\/en.wikipedia.org\/wiki\/Tor_(anonymity_network)#Weaknesses\" target=\"_blank\" rel=\"noopener noreferrer\">numerous privacy concerns<\/a> about how the Tor network operates, and many <a href=\"https:\/\/restoreprivacy.com\/tor\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">theoretical and real-world Tor attacks<\/a> have been documented. Law enforcement agencies have apprehended criminals who mistakenly believed that Tor was keeping them anonymous.<\/p>\n<p>Malware has even been <a href=\"https:\/\/www.securityweek.com\/onionduke-apt-malware-distributed-malicious-tor-exit-node\" target=\"_blank\" rel=\"noopener noreferrer\">injected into Tor traffic<\/a> by malicious parties. If you use Tor, it&#8217;s wise to use good anti-malware software with real-time scanning. We recommend <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego VirusBarrier (part of Mac Premium Bundle)<\/a>, or <a href=\"https:\/\/www.intego.com\/intego-antivirus\">Intego Antivirus for Windows<\/a>.<\/p>\n<p>One major issue is that anyone can operate a Tor relay\u2014which makes it easy for intelligence agencies and malicious parties to spy on, and potentially modify, Tor traffic.<\/p>\n<h3>One malicious party controlled 24% of all Tor exit nodes<\/h3>\n<p>Here&#8217;s the most recent example of a real-world Tor attack that demonstrates why it&#8217;s unsafe.<\/p>\n<p>According to a <a href=\"https:\/\/medium.com\/@nusenu\/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> published on Saturday, a single unidentified threat actor controlled 23.95% of all Tor exit relays on May 22, 2020. The report states that as of August 8, the same attacker still controlled more than 10% of all exit nodes.<\/p>\n<div id=\"attachment_91983\" style=\"width: 1376px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-91983\" loading=\"lazy\" class=\"size-full wp-image-91983\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/24-percent-of-tor-exit-nodes-controlled-by-one-attacker.png\" alt=\"24% of Tor exit nodes controlled by one attacker\" width=\"1366\" height=\"613\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/24-percent-of-tor-exit-nodes-controlled-by-one-attacker.png 1366w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/24-percent-of-tor-exit-nodes-controlled-by-one-attacker-300x135.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/24-percent-of-tor-exit-nodes-controlled-by-one-attacker-1024x460.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/24-percent-of-tor-exit-nodes-controlled-by-one-attacker-150x67.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/24-percent-of-tor-exit-nodes-controlled-by-one-attacker-768x345.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/24-percent-of-tor-exit-nodes-controlled-by-one-attacker-657x295.png 657w\" sizes=\"(max-width: 1366px) 100vw, 1366px\" \/><p id=\"caption-attachment-91983\" class=\"wp-caption-text\">Nearly 24% of all Tor exit nodes were controlled by a single attacker on May 22. Image: <a href=\"https:\/\/medium.com\/@nusenu\/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac\" target=\"_blank\" rel=\"noopener noreferrer\">nusenu<\/a><\/p><\/div>\n<p>The threat actor is engaging in a man-in-the-middle attack to remove security from some Web traffic. When certain traffic passes through the relay, it downgrades the connection from HTTPS to HTTP. It then replaces Bitcoin addresses within the page, in an attempt to make money for the attacker.<\/p>\n<p>It&#8217;s worth noting that the attacker might also be monitoring the traffic for sensitive or personally identifiable information.<\/p>\n<p>According to <a href=\"https:\/\/www.zdnet.com\/google-amp\/article\/a-mysterious-group-has-hijacked-tor-exit-nodes-to-perform-ssl-stripping-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet<\/a>, a similar but much smaller-scale attack occurred in 2018.<\/p>\n<h3>Using a trusted VPN is better than Tor for privacy and security<\/h3>\n<p>Given how easy it is for spies and hackers to create their own Tor relays and monitor (or even modify) traffic, we cannot recommend using Tor as a means of protecting your privacy.<\/p>\n<p>The better choice for protecting your privacy and security is to use a trusted VPN. The acronym VPN stands for virtual private network. When using a VPN on your computer or mobile device, the VPN hides your IP address from the destination servers. If you&#8217;re concerned about someone potentially obtaining logs of your activity from the VPN provider, use a VPN with a no-log policy.<\/p>\n<p>Also, avoid using any so-called &#8220;free&#8221; VPN services. Any high-quality VPN service is expensive to operate. If users aren&#8217;t paying money for the service, consider how the company generates revenue. If it&#8217;s unclear how they can afford to run a VPN, they may be monitoring traffic and selling user data.<\/p>\n<p>Intego recommends and trusts the following VPN providers: <a href=\"https:\/\/www.privateinternetaccess.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Private Internet Access<\/a>, <a href=\"https:\/\/www.cyberghostvpn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberGhost<\/a>, and <a href=\"https:\/\/zenmate.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZenMate<\/a>. Each offers promotional discounts when you sign up.<\/p>\n<p>To learn lots more about VPNs and some of their many benefits, check out our featured article, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-should-connect-to-a-vpn-on-mac-and-ios-and-how-to\/\">Why you should use a VPN on Mac and iOS \u2014 and How To<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"ZJdktIT1By\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-should-connect-to-a-vpn-on-mac-and-ios-and-how-to\/\">Why you should use a VPN on Mac and iOS \u2014 and How To<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Why you should use a VPN on Mac and iOS \u2014 and How To&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-should-connect-to-a-vpn-on-mac-and-ios-and-how-to\/embed\/#?secret=ZJdktIT1By\" data-secret=\"ZJdktIT1By\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" alt=\"\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>Each week on the <strong>Intego Mac Podcast<\/strong>, we discuss the top security and privacy concerns for users of Apple products. For example, we talked about the latest Tor attack in <a href=\"https:\/\/podcast.intego.com\/148\" target=\"_blank\" rel=\"noopener noreferrer\">episode 148<\/a>. Be sure to <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\">subscribe<\/a> to make sure you never miss the latest episode.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+XmDP18Md?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You&#8217;ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for updates.<\/p>\n<p>Follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14\u00a0to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tor is supposed to protect your privacy. But nearly 24% of all Tor exit relays were owned by a malicious party on May 22, and they still control 10% today.<\/p>\n","protected":false},"author":14,"featured_media":91987,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[569],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Tor is supposed to protect your privacy. But nearly 24% of all Tor exit relays were owned by a malicious party on May 22, and they still control 10% today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malicious party hijacks 24% of Tor network - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Tor is supposed to protect your privacy. But nearly 24% of all Tor exit relays were owned by a malicious party on May 22, and they still control 10% today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-14T00:46:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-14T15:42:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Tor logo\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/\",\"name\":\"Malicious party hijacks 24% of Tor network - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#primaryimage\"},\"datePublished\":\"2020-08-14T00:46:36+00:00\",\"dateModified\":\"2020-08-14T15:42:41+00:00\",\"description\":\"Tor is supposed to protect your privacy. But nearly 24% of all Tor exit relays were owned by a malicious party on May 22, and they still control 10% today.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malicious party hijacks 24% of Tor network\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Malicious party hijacks 24% of Tor network\",\"datePublished\":\"2020-08-14T00:46:36+00:00\",\"dateModified\":\"2020-08-14T15:42:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#webpage\"},\"wordCount\":743,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png\",\"keywords\":[\"Tor\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Tor is supposed to protect your privacy. But nearly 24% of all Tor exit relays were owned by a malicious party on May 22, and they still control 10% today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/","og_locale":"en_US","og_type":"article","og_title":"Malicious party hijacks 24% of Tor network - The Mac Security Blog","og_description":"Tor is supposed to protect your privacy. But nearly 24% of all Tor exit relays were owned by a malicious party on May 22, and they still control 10% today.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2020-08-14T00:46:36+00:00","article_modified_time":"2020-08-14T15:42:41+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png","width":400,"height":260,"caption":"Tor logo"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/","name":"Malicious party hijacks 24% of Tor network - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#primaryimage"},"datePublished":"2020-08-14T00:46:36+00:00","dateModified":"2020-08-14T15:42:41+00:00","description":"Tor is supposed to protect your privacy. But nearly 24% of all Tor exit relays were owned by a malicious party on May 22, and they still control 10% today.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Malicious party hijacks 24% of Tor network"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Malicious party hijacks 24% of Tor network","datePublished":"2020-08-14T00:46:36+00:00","dateModified":"2020-08-14T15:42:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#webpage"},"wordCount":743,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png","keywords":["Tor"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/why-tor-is-bad-for-your-privacy-and-security\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/08\/Tor-logo-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nVz","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91981"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91981"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91981\/revisions"}],"predecessor-version":[{"id":92007,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91981\/revisions\/92007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/91987"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}