Correct, but with a few caveats.
Traffic analysis is not a Tor compromise, it is a side-effect of whatâs possible in a low-latency anonymity network. Just like a server seizure isnât a âTor compromiseâ or a NIT being deployed on an onion site isnât a âTor compromise".
Going deeper, you must also look at the entire case and how they investigated it.
The Boystown admins were using Ricochet, which lacked several traffic-correlation mitigations later used by Ricochet Refresh. Investigators leveraged this by sending Ricochet messages to the admins at specific times. While doing this, they monitored a large set of Tor middle relays to watch for traffic bursts with the characteristic size and timing of the Ricochet message.
When a monitored relay saw the matching burst, investigators could infer that this relay was on the adminâs circuit and, from there, identify the adminâs entry guard. This is a form of guard discovery via active correlation.
With the guard identified, authorities then subpoenaed the ISP and obtained records of which subscribers were connected to that guard at the precise message times. That yielded a short list of candidate IP addresses. From there, traditional tactics were likely used, such as surveillance, subpoenaing accounts and other services, and search warrants to confirm which suspect controlled the admin account.
None of this screams âTor compromiseâ. It was a lengthy investigation, tiring and time-consuming for all investigators, that only led to 4 arrests. According to reports, there were over 400,000 members and only 4 got nabbed in this massive investigation. Donât you think they would try to get maybe a few more and say they were caught in it too if they had broken Tor? Even if they could grab an extra hand full of producers or high-level contributors?
I remember hearing about Liberty Lane before it even hit Reddit, and at the time I was skeptical, and now I am even more-so. I remember seeing the original Google Sheets of cases people speculated were linked to Liberty Lane and kept a close eye on that as the Google Sheet expanded with more and more names and cases.
One thing youâll notice if you get your hands on that Google Sheet (Should be in the Reddit comments of the original Liberty Lane post iirc) is that all the dates were in or before 2019. This was before v3 onions were widely adopted and very long before v2 onions were deprecated. People, at the time, speculated that it had something to do with v2 onions being compromised. While we know v2 onions were weaker than v3, obviously, saying they were compromised is a long reach. v2 onions were much easier to perform correlation attacks on, this couldâve resulted in a few arrests, but not a network-wide compromise. v3, the onions we use now, are much harder to perform analysis on, while not impossible. Vanguards is also now built into the network, further enhancing analysis defenses.
I think itâs good to be weary, but you can only worry so much about the unknown. I do not believe any government has a golden key into the Tor network. It always has been, if youâre a big enough target, there will always be a chance you get caught. One mistake which leads to a guard node being compromised or discovered which leads to your IP that you use at your home and youâre caught. Take precaution. The same applies to this. I think what happened with Liberty Lane was similar to what happened with BoysTown. They used traffic correlation at ISP/IXPs and confirmed who was using which nodes that connected to illegal sites and nabbed them after investigating further to confirm they did.
Correct. KAX-17 gets its name from being recognized at originating in 2017. In 2019, the Tor Directory Authority (DA) removed many suspicious nodes (not originally thought to be KAX-17 but later was said to be KAX-17) and continued removing them up until 2021, when a massive network purge was attributed to being KAX-17 nodes.
Most of these relays were middle relays and very few of them had the guard flag attributed to them, meaning it wasnât possible to get them as a guard. From this, it is likely that if a government was running this operation, it would be akin to what happened with the BoysTown case. They would use the middle relays to try and find your guard node and then narrow down who you are based on regular investigative techniques. It is not something that is all encompassing and would still take a lot of work to deanonymize someone. Furthermore, it is not targeted. So if you were looking for a specific someone, you would need to wait until they connected to your nodes, if ever.
Sidenote: It is believed that BTCMITM20 could also possibly be the same threat actor as KAX-17. While the motive for KAX-17 spinning up a bunch of middle relays is unknown, the motive for BTCMITM20, as the name implies, was to modify BTC addresses by spinning up a bunch of exit relays. If you entered a BTC address while connected to one of these exits and attempted to send money, it would go to the threat actors wallet. If these two are related is still debated, though.