Guevara Noubir in the Press
Ars Technica
The radio navigation planes use to land safely is insecure and can be hacked
The researchers, from Northeastern University in Boston, consulted a pilot and security expert during their work, and all are careful to note that this kind of spoofing isn’t likely to cause a plane to crash in most cases. ILS malfunctions are a known threat to aviation safety, and experienced pilots receive extensive training in how […]
The Conversation
Your mobile phone can give away your location, even if you tell it not to
Most people expect that turning their phone’s location services off disables this sort of mobile surveillance. But the research conducted by Northeastern University researchers Guevara Noubir, Sashank Narain, Triet Vo-Huu, Ken Block and Amirali Sanatinia, in a field called “side-channel attacks,” uncovers ways that apps can avoid or escape those restrictions.
Why Tor and privacy may no longer be synonymous
However, these same pundits (including me) are now warning that government agencies, including the FBI, are finding ways to circumvent the technology behind Tor. Knowing that might, and should, give pause to those who use and rely on Tor. Adding more fuel to the fire are two researchers at Northeastern University: Guevara Noubir, professor of […]
Android apps can infer your location through sensors – no permissions needed
Android users beware: You might have apps tapping into your whereabouts without your knowledge. Recent research from Northeastern has shown Android apps requiring zero permissions can actually access certain sensors in your phone that enables them to infer your location, past and present. Guevara Noubir, professor at Northeastern’s College of Computer and Information Science, was […]
Extreme Tech
Researchers find more than 100 Tor nodes that are snooping on users
Security researchers (and indeed, law enforcement) have worked out a number of theoretical ways to attack Tor. This might involve taking over a significant number of nodes, which are just computers and servers around the world, to crack anonymity. Or it may involve simply monitoring the time that connections enter and exit Tor as a […]
Security Affairs
Two security experts have conducted a study that allowed them to spot over 100 snooping Tor HSDir Nodes spying on Dark Web Sites.
The attempts of snooping traffic from Tor nodes are not a novelty, in the past, we have reported the activity of threat actors that set up malicious exit nodes to de-anonymize users. Now researchers have spotted more than 100 malicious hidden service directories (HSDirs) which are the relays of the network that allow people to visit hidden […]
Boing Boing
Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know what webserver you are connecting […]
MIT Technology Review
How the next generation of botnets will exploit anonymous networks, and how to beat them
More recently, botnets have begun to exploit the Tor network which is designed to allow people to communicate across the Internet anonymously. This, combined with the advent of untraceable electronic currencies such as Bitcoin, has led to the rise of blackmail and ransomware that cannot be traced even after a payment has been made. Today, […]








