Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Tor replaces legacy encryption to block traffic tagging attacks

Counter Galois Onion algorithm launches to prevent user de-anonymization.

byAytun Çelebi
December 1, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

The Tor Project has initiated a critical cryptographic overhaul of its anonymity network, replacing its legacy “tor1” relay encryption algorithm with a new research-backed protocol designated “Counter Galois Onion” (CGO). Announced in late November 2025, this transition addresses structural vulnerabilities in the network’s original design that allowed sophisticated adversaries to potentially de-anonymize users through traffic manipulation. The new system is built on a “Rugged Pseudorandom Permutation” (RPRP) construction known as UIV+, developed by cryptographers Jean Paul Degabriele, Alessandro Melloni, Jean-Pierre Münch, and Martijn Stam.

The primary driver for this update is the elimination of “tagging attacks,” a method where malicious relay operators modify encrypted packets to track them across the network. The deprecated tor1 algorithm relied on AES-CTR encryption without hop-by-hop authentication, making the traffic malleable; attackers could inject subtle patterns (tags) into the data stream that persisted through decryption layers, effectively marking a user’s traffic. CGO neutralizes this by implementing wide-block encryption with tag chaining. Under this new architecture, any attempt to tamper with a single packet garbles the entire subsequent stream, making the modification immediately detectable and rendering the traffic unrecoverable rather than traceable.

Beyond stopping active attacks, CGO introduces cryptographic rigor that was absent in the 2004-era tor1 design. The legacy system reused the same AES keys for the entire duration of a circuit, meaning a compromised key could expose all historical data from that session. CGO enforces “immediate forward secrecy” by updating encryption keys and nonces after every single cell (packet), ensuring that a stolen key cannot decrypt past traffic. Furthermore, the update retires the obsolete SHA-1 hashing algorithm—which offered a weak 4-byte authentication digest with a 1-in-4-billion forgery chance—replacing it with a robust 16-byte authenticator. The protocol is currently being integrated into Tor’s Rust-based Arti client and the classic C implementation, though it remains in an experimental phase with no required user action.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


Featured image credit

Tags: prowserTor

Related Posts

Nvidia hits 200 teraFLOP emulated FP64 for scientific computing

Nvidia hits 200 teraFLOP emulated FP64 for scientific computing

January 19, 2026
Walmart maintains Apple Pay ban in U.S. stores for 2026

Walmart maintains Apple Pay ban in U.S. stores for 2026

January 19, 2026
iOS 27: Everything we know so far

iOS 27: Everything we know so far

January 19, 2026
Google Wallet and Tasks integrations surface in new Pixel 10 leak

Google Wallet and Tasks integrations surface in new Pixel 10 leak

January 19, 2026
Threads hits 141 million daily users to claim the mobile throne from X

Threads hits 141 million daily users to claim the mobile throne from X

January 19, 2026
Microsoft pushes emergency OOB update to fix Windows 11 restart loop

Microsoft pushes emergency OOB update to fix Windows 11 restart loop

January 19, 2026

LATEST NEWS

Nvidia hits 200 teraFLOP emulated FP64 for scientific computing

Walmart maintains Apple Pay ban in U.S. stores for 2026

iOS 27: Everything we know so far

Google Wallet and Tasks integrations surface in new Pixel 10 leak

Threads hits 141 million daily users to claim the mobile throne from X

Microsoft pushes emergency OOB update to fix Windows 11 restart loop

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.