{"id":36362,"date":"2020-07-30T22:08:42","date_gmt":"2020-07-30T22:08:42","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/"},"modified":"2020-07-30T22:08:42","modified_gmt":"2020-07-30T22:08:42","slug":"infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/","title":{"rendered":"Infosec bod: I&#8217;ve found zero-day flaws in Tor&#8217;s bridge relay defenses. Tor Project: Only the zero part is right"},"content":{"rendered":"<p>Neal Krawetz, a computer forensics expert, has published details on how to detect Tor bridge network traffic that he characterizes as &#8220;zero-day exploits&#8221;&#8230; which the Tor Project insists are nothing of the sort.<\/p>\n<p>The project provides open-source software for communicating anonymously over the internet. It works by randomly routing your connections through a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/2019.www.torproject.org\/about\/overview.html.en#thesolution\">network of nodes<\/a> spread across the world. Thus, when you use a website or some other service via Tor, your public IP address is concealed, meaning that website or service, and any eavesdroppers on the line, can&#8217;t use the connection to trace you back to your home broadband, office, cafe, or from wherever you&#8217;re using Tor, and your anonymity is preserved. The project also provides a Firefox-based browser for connecting to the public web and hidden services via this network.<\/p>\n<p>Typically, users slide into the Tor network through a publicly listed entry relay, though they may choose to join via a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/2019.www.torproject.org\/docs\/bridges.html.en\">bridge relay<\/a>, or bridge for short, to avoid IP-based detection and censorship. Some countries, ISPs, and system administrators will put in place mechanisms that detect and stop traffic to entry relays as it&#8217;s assumed you&#8217;ll be up to no good. Bridges aren&#8217;t publicly listed like entry relays; connecting to one may not set off any alarms as network administrators won&#8217;t be aware of it, allowing you into Tor unhindered.<\/p>\n<p>&#8220;Even if your ISP is filtering connections to all the known Tor relays, they probably won&#8217;t be able to block all the bridges,&#8221; the Tor documentation noted. &#8220;If you suspect your access to the Tor network is being blocked, you may want to use bridges.&#8221;<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/08\/02\/onion_cry.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt><\/p>\n<h2 title=\"Latest Tor Browser iteration makes the dark web a bit more memorable\">Tor soups up onion sites with bountiful browser bump: No more tears trying to find the secure sites you want<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/06\/03\/tor_browser_upgrade\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Having said that, the bridge approach is not infallible. The Tor Project conceded censors have developed ways to detect and block Tor traffic even when people are using bridges, usually by inspecting packets in transit for telltale signs. The project has tried to address this through <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/trac.torproject.org\/projects\/tor\/wiki\/doc\/PluggableTransports\/list\">pluggable transports<\/a>, which act as proxies and alter the characteristics of network traffic between the client and bridge so the ostensibly covert communication becomes more difficult to identify and block.<\/p>\n<p>The Tor Browser currently implements four pluggable transports: obfs4, meek, \u200bFormat-Transforming Encryption (FTE), and ScrambleSuit.<\/p>\n<p>According to Krawetz, two of these \u2013 obfs4 and meek \u2013 can be detected, which undermines Tor&#8217;s reason for being. If censors can spot Tor traffic, they can block it.<\/p>\n<p>Krawetz, in a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.hackerfactor.com\/blog\/index.php?\/archives\/889-Tor-0day-Burning-Bridges.html\">blog post<\/a>, said he&#8217;s spent years reporting security vulnerabilities to the Tor Project, only to have his advisories dismissed or ignored. &#8220;Since the public should know how vulnerable Tor makes them, I am making these vulnerabilities public,&#8221; he wrote on Thursday.<\/p>\n<p>Krawestz in June committed to publicly revealing Tor vulnerabilities because he is fed up with the project&#8217;s handling of bug reports. Tor&#8217;s developers, meanwhile, said the reported flaws are not new or poorly documented.<\/p>\n<p>&#8220;We&#8217;re happy to get bug reports in whatever way the reporter is willing to provide them,&#8221; a Tor Project spokesperson said in an emailed statement to <i>The Register<\/i>. &#8220;The two reports from last week are not new, and the reports from today are worth investigating but are presented with little evidence that they work at scale.&#8221;<\/p>\n<h3 class=\"crosshead\"> <span>So what&#8217;s the issue?<\/span><br \/>\n<\/h3>\n<p>The vulnerabilities amount to techniques for detecting obfs4 and meek traffic. And once detected, such traffic can be blocked. That&#8217;s arguably not as severe as, say, unmasking a Tor user from their packets, though it&#8217;s not ideal.<\/p>\n<p>The Tor Project&#8217;s spokesperson said that, despite Krawetz&#8217;s assertion that he&#8217;s unaware of previous public disclosure for detecting and blocking obfs4, academic papers published in <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/censorbib.nymity.ch\/#Wang2015a\">2015<\/a> and <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/censorbib.nymity.ch\/#Frolov2020a\">2020<\/a> explore this very issue.<\/p>\n<p>In his post, Krawetz described how to identify obfs4 using stateful packet inspection \u2013 applying filtering rules to follow network and transport packet fields to decide whether traffic is allowed, but not delving into the packet&#8217;s application layer, which is the province of deep packet inspection. And he also discusses identifying meek by looking for characteristic traffic timing delays between the client and server.<\/p>\n<p>The issue, as Krawetz describes it, is that Tor hasn&#8217;t adequately responded to the censorship arms race. The Tor Project, he said, appears to have given up and settled on obfs4 as a means of avoiding network traffic detection.<\/p>\n<p>&#8220;This is fine if nobody knows how to detect and block obfs4 traffic,&#8221; he said. &#8220;However, China appears to have a complicated method for detecting and blocking obfs4 connections, and I have just shown that an easier stateful packet inspection system can detect obfs4 traffic.&#8221;<\/p>\n<p>The Tor Project&#8217;s spokesperson said Krawestz&#8217;s citation of <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.usenix.org\/system\/files\/conference\/foci18\/foci18-paper-dunna.pdf\">a 2018 paper<\/a> [PDF] to support his claim that the Great Firewall of China (GFW) can detect obfs4 appears to misunderstand the findings, which state, &#8220;We find that the two most popular pluggable transports (Meek and Obfs4) are still effective in evading GFW\u2019s blocking of Tor.&#8221;<\/p>\n<p>The spokesperson also pointed to research showing that obfs4 bridges distributed over BridgeDB are blocked while private obfs4 bridges are not, indicating that the censors are intercepting bridge information from distributors rather than blocking the protocol itself.<\/p>\n<p>&#8220;The blog post is correct in suggesting that a finely-calibrated decision tree can be highly effective in detecting obfs4; this is a weakness of obfs4,&#8221; the Tor Project&#8217;s spokesperson said.<\/p>\n<p>&#8220;However, what works in someone&#8217;s living room doesn&#8217;t necessarily work at nation-scale: running a decision tree on many TCP flows is expensive (but not impossible) and it takes work to calibrate it.<\/p>\n<p>&#8220;When considering the efficacy of this, one also has to take into account the base rate fallacy: the proportion between circumvention traffic and non-circumvention traffic is not 1:1, meaning that false positives\/negative rate of 1 per cent (which seems low!) can still result in false positives significantly outweighing true positives. That said, obfs4 is certainly vulnerable to this class of attack.&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/07\/30\/tor_bugs_obfs4\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Warnings either not new or need more study, reckons open-source dev team Neal Krawetz, a computer forensics expert, has published details on how to detect Tor bridge network traffic that he characterizes as &#8220;zero-day exploits&#8221;&#8230; which the Tor Project insists are nothing of the sort.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36363,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-36362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infosec bod: I&#039;ve found zero-day flaws in Tor&#039;s bridge relay defenses. Tor Project: Only the zero part is right 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infosec bod: I&#039;ve found zero-day flaws in Tor&#039;s bridge relay defenses. Tor Project: Only the zero part is right 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-30T22:08:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Infosec bod: I&#8217;ve found zero-day flaws in Tor&#8217;s bridge relay defenses. Tor Project: Only the zero part is right\",\"datePublished\":\"2020-07-30T22:08:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/\"},\"wordCount\":1023,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/\",\"name\":\"Infosec bod: I've found zero-day flaws in Tor's bridge relay defenses. Tor Project: Only the zero part is right 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg\",\"datePublished\":\"2020-07-30T22:08:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infosec bod: I&#8217;ve found zero-day flaws in Tor&#8217;s bridge relay defenses. Tor Project: Only the zero part is right\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infosec bod: I've found zero-day flaws in Tor's bridge relay defenses. Tor Project: Only the zero part is right 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/","og_locale":"en_US","og_type":"article","og_title":"Infosec bod: I've found zero-day flaws in Tor's bridge relay defenses. Tor Project: Only the zero part is right 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-30T22:08:42+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Infosec bod: I&#8217;ve found zero-day flaws in Tor&#8217;s bridge relay defenses. Tor Project: Only the zero part is right","datePublished":"2020-07-30T22:08:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/"},"wordCount":1023,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/","url":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/","name":"Infosec bod: I've found zero-day flaws in Tor's bridge relay defenses. Tor Project: Only the zero part is right 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg","datePublished":"2020-07-30T22:08:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/infosec-bod-ive-found-zero-day-flaws-in-tors-bridge-relay-defenses-tor-project-only-the-zero-part-is-right\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Infosec bod: I&#8217;ve found zero-day flaws in Tor&#8217;s bridge relay defenses. Tor Project: Only the zero part is right"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36362"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36362\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36363"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}