• /about
  • /articles
  • /projects
  • /links
  • /explore
  • /café
  • /guest
  • /notes
  • /rss
  • ◑

De-anonymization tools

January 5, 2023124 words1 min read

A small list of tools useful for de-anonymization.

  • Bluetooth detection and de-anonymization tool
  • Data analysis and de-anonymization
  • De-anonymize ISP trajectories using external information, e.g., users’ check-ins at online social network
  • Cross-Layer de-anonymization methods in the Lightning protocol
  • Password-conditioned Face Identity Transformer
  • Traffic de-anonymization, including Tor
  • Network traffic handling tool on input interfaces (to remove sensitive information transmitted in the open over protocols)
  • TCP ISN CPU leak protection tool (randomization of initial TCP sequence numbers to prevent leakage)
  • De-anonymizing Crypto Addresses
  • Implementing privacy protection engineering
  • VPN detection
  • Browser de-anonymization attacks
  • Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level
  • De-anonymizing Tor or VPN users with website fingerprinting and machine learning
  • Profiling and de-anonymizing Ethereum users
  • VPN Detection in the browser using JavaScript

Enjoy.

permalink http://sizeof.cat/post/de-anonymization-tools/

created January 5, 2023

words 124

tags #tools, #privacy

Check out some related articles:

  • VPN killswitch and UncomplicatedFireWall (ufw)
  • Secure communication using Tor and socat
  • Reduce tracking via NetworkManager
  • Aren't we chatty today, Windows 11
  • Web Browser telemetry - 2025 edition
For a bird born in captivity, flight is a mental illness.