Researchers deanonymized anonymous Tor Mail account users, raising awareness of the privacy implications of reusing even a complex password when creating an anonymous account. Credit: Ben Patterson / IDG 2018 is starting off with a crazy vibe. For example, instead of harping on fake news, the U.S. President tweeted a different version of mine-is-bigger-than-yours – not that, silly; he was talking about the nuke button:North Korean Leader Kim Jong Un just stated that the “Nuclear Button is on his desk at all times.” Will someone from his depleted and food starved regime please inform him that I too have a Nuclear Button, but it is a much bigger & more powerful one than his, and my Button works!— Donald J. Trump (@realDonaldTrump) January 3, 2018Shortly thereafter, literally like 16 minutes later, no longer able to refrain from using the words “fake news,” President Trump tweeted his intention to announce the “awards” for what he considers to be the worst of the worst — the most dishonest and corrupt media coverage.I will be announcing THE MOST DISHONEST & CORRUPT MEDIA AWARDS OF THE YEAR on Monday at 5:00 o’clock. Subjects will cover Dishonesty & Bad Reporting in various categories from the Fake News Media. Stay tuned!— Donald J. Trump (@realDonaldTrump) January 3, 2018While his announcement will made next week, the idea for the awards has clearly been on the back burner for over a month. Back in November, he tweeted the idea for the “FAKE NEWS TROPHY.”We should have a contest as to which of the Networks, plus CNN and not including Fox, is the most dishonest, corrupt and/or distorted in its political coverage of your favorite President (me). They are all bad. Winner to receive the FAKE NEWS TROPHY!— Donald J. Trump (@realDonaldTrump) November 27, 2017Writing style and now complex passwords give your identity awayIf stylometry were applied to Trump, then surely his use of “fake news” would help identify him if he were trying to tweet anonymously, right? Maybe not, but analyzing writing style — things like word choice, punctuation and sentence structure — has long been a way to deanonymize “hackers, trolls and malware writers,” as well as to unmask the people behind other anonymously posted online content (pdf). Even programmers can be deanonymized from their coding style. But did you know people can be deanonymized through their use of complex passwords? Granted, we should not reuse passwords at all. But password reuse is not something that only people with pathetically weak passwords might do. Password managers are the wise move, but sometimes it is “fun” to come up with a password that will theoretically take decades or more to crack. A person trying to stay anonymous might think that if they were to reuse that password, there would be no way to unmask their identity. Yet that is not true, according to article posted on STS Cyber Research.In this case, the research showed, the rarer your password is, the more it “uniquely identifies the person who uses it. If a person uses the same unique password with multiple accounts, then that password can be used as a digital fingerprint to link those accounts.” Although this is not something previously unknown, there seems to be a lack of awareness about the practice. The researchers wrote:We demonstrate that a large number of anonymous account users who are savvy enough to have complex passwords but still use their regular password with an anonymous account are vulnerable to being de-anonymized by even the limited credential leaks available to the public.To prove this, they started with the now-defunct Tor Mail, as well as the 1.4 billion clear text credentials that were found on the dark web. Then they took Tor Mail accounts with “sufficiently complex passwords” — meaning it had to have at least 10 characters or have at least three characters out of the types lowercase, uppercase, digital and symbol — and linked them “to non-anonymous email accounts that used the same or similar passwords.”We were able to de-anonymize with a high degree of certainty more than 16% of the 1019 Tormail accounts found.Put another way, the researchers were able to deanonymize 157 of the 1,019 Tor Mail accounts using publicly available data sets. They believe this is due to a “general lack of awareness of the privacy implications to re-using an existing password when creating an anonymous account.”After the analysis, they wanted to point out a few examples of how a password “gives away details about the user without necessarily correlating them to another account.”Using real initials and full year of birth as a password (e.g. jwd1974)Using full date of birth in a password (i.e. YYYYMMDD or something of that sort)Using a real name or non-anonymous username with a number on the end (e.g. JohnDoe1)Using an anonymous account name as password on a regular accountCopying and pasting a regular password twice as an anonymous password Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe