De-anonymization tools
A small list of tools useful for de-anonymization.
- Bluetooth detection and de-anonymization tool
- Data analysis and de-anonymization
- De-anonymize ISP trajectories using external information, e.g., users’ check-ins at online social network
- Cross-Layer de-anonymization methods in the Lightning protocol
- Password-conditioned Face Identity Transformer
- Traffic de-anonymization, including Tor
- Network traffic handling tool on input interfaces (to remove sensitive information transmitted in the open over protocols)
- TCP ISN CPU leak protection tool (randomization of initial TCP sequence numbers to prevent leakage)
- De-anonymizing Crypto Addresses
- Implementing privacy protection engineering
- VPN detection
- Browser de-anonymization attacks
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level
- De-anonymizing Tor or VPN users with website fingerprinting and machine learning
- Profiling and de-anonymizing Ethereum users
- VPN Detection in the browser using JavaScript
Enjoy.