Tor was created by the US government to provide anonymity for it’s own spies to conduct their operations anonymously in remote countries
Tor was created by Nick Mathewson, Roger Dingledine and Paul Syverson. Tor is based on U.S. Naval Research Laboratory’s onion routing, where Syverson worked at.
The Tor Project recieves millions in funding from the US government
Bullshit follow the money argument. The US government is not a monolithic entity. Even NSA’s Information Assurance Directoriate and Tailored Access Operations / Cyber Command go up against each other. All agencies compete for funding and try to justify their budget and expansion of it.
It’s fine to use it only if you want anonymity against a state which is not the US nor one of it’s allies.
Here’s a top secret slide from Snowden documents. Anyone with access to this document in 2012 would’ve been black bagged or offed by the CIA.
Source: 'Tor Stinks' presentation – read the full document | US news | theguardian.com
In short, the only way for one adversary to deanonymize the vast majority of the Tor users would either for him to possess a 0day
Zero-days are just vulnerabilities that aren’t patched yet. They are a fact of life. Anyone who’s ever written software knows how shit-hard it is to write perfect software. Zero-day doesn’t make something a honeypot. Honeypot would be, if the software had zero-days that the company knows about, but intentionally delays or refuses to patch.
Or, it would require that adversary to control most of the nodes
Sybil attack isn’t required to deanonymize Tor users. You can do that with end-to-end correlation attacks.
Why would Tor serve the governments ?
Then he points out to slide that shows governments can benefit from traffic analysis resistance. Duh. You don’t want FBI agents to leave official government IP addresses to criminals’ servers.
Why would big tech participate in developing a tool that supposedly undermines it’s ability to trace internet users ?
Looks like Google Summer of code ALSO supported AbiSource Google Summer of Code 2008 | Google for Developers, a FOSS competitor to Google Docs text editor. The conspiracy goes even deeper!
The article cries about Tor being in touch with US government but doesn’t seem to care about the importance of communicating the benefits of dual use goods to the US government. Which is what’s preventing the project from being shut down.
“Using Tor to track users”
Makes scary highlights about emails about visualizing Tor users on a map. Yeah like this
Example of a study on deanonymizing Tor users:
Yeah, selecting EC2 sentinels both as entry and as exit nodes means end-to-end correlation attack. Nothing new. This is THE attack against Tor. It requires a well-funded adversary such as FVEY.
Tor sticks to entry nodes for a very long time so the chances are you’re not going to connect to the sentinel, and you’re fine. Or, if you do, the lifetime of one circuit is 10 minutes.
This is reaching towards sybil attacks. Nothing you can do but make it more popular and grow the network.
They obviously won’t ever admit officially to selling user data, as the userbase would flee from the network.
Or maybe they obviously don’t have the data?
Passive Adversary Deanonymization (the ISP is spying on the traffic)
A single consumer ISP getting lucky enough to have entry and exit nodes is rare.
This is what we covered just above with Team Cymru running Tor nodes for their own profit
This was a wider set of nodes. ISPs aren’t running their own Tor nodes.
Now according to Evgeny (the founder of Simplex Chat, which I’ve directly chatted with about on this topic), his approach to the problem is to rely on the law, KYC the node runners and force them to accept a ToS and sign a contract that contractually prohibits them from selling user data for profit, nor collect it either.
Simplex isn’t doing jack shit about hiding your IP-address by default. I’ve been extremely vocal about this in the past. It’s indeed hilarious Evgeny thinks intelligence agencies would play by the laws. The NSA plays by the secret interpretations of secret laws. It doesn’t give a flying fuck about some KYC when they’re legally obligated to lie about their capabilities and actions to keep the actions covert. The article got this right in
Except that it’s governments that are the ones that want anonymity to disappear on the internet, they are the tyrants that are writing the laws. So that’s not an option either. You cannot rely on the law because the laws are selectively enforced based on which law’s currently popular, and based on whatever the government wants gone.
**IMO The real solution here is to ensure that users’ traffic looks the same using extensive padding on the traffic shape and timing
Traffic flow confidentiality is really important, but Tor isn’t about that. Tor is about masking your IP-address. Looks like the author doesn’t understand the differences between the mechanisms to protect metadata.
The author then posts
which is kind of funny. Decoy destinations may obfuscate intent, but let’s say you connect to google, NYT, WaPo, and youtube, and over the next hour it’s YouTube that’s relaying traffic to you, three guesses which one you were actually using. You’d have to have an autonomous agent running on your system to do three other things at once to hide which one you’re doing yourself. That’s not in Tor’s domain.
Also, if one of them is about making molotov cocktails, you won’t get a free pass in court if you say it wasn’t you but an agent. You’re responsible for what your device does.
As for private data exchange, basically, communication, you’re not connecting to Al-Qaeda just to obfuscate you’re talking to your buddy about ICE. You’ll intercept a hell-fire missile just for the sheer possibility you are a member of Al-Qaeda.
The only nodes that you can trust are the ones that you are running yourself.
Ridiculous. If you are running the entry and exit node, and routing all traffic through those, you’re deanonymizing yourself. It’s like buying two VPS servers, and browsing through proxy chaining those two. It doesn’t work.
But if you are running more than one node (and keeping it a secret of course)
Yes I’m sure I can run an uninspectable Tor node on a server leased from a VPS provider, that can at any time view the server with their out of bound management system. I’m sure they’re extremely interested in fighting to tooth and nail with the government about keeping my server rental secret from the US government. And yes, the VPS companies that accept Monero are definitely not honeypots lol.
So what do I use instead of Tor then ? Yep, you guessed it. I’m working on a Darknet that is going to replace Tor.
So this is an ad for a competing product.
In the meantime we don’t have a choice but to use Tor, because sadly they’re the only usable darknet option out there currently.
99% of the article complained about the clear-web surfing, and the article didn’t even mention hidden or onion services, but they have the audacity to complain about Tor being the only usable darknet option.
I wouldn’t complain if they offered something tangible here, but, they did not address the number one attack, end-to-end correlation, in any way. They didn’t even mention the term. They talked about traffic flow confidentiality, but they didn’t know the term.
This article screams Dunning-Kruger.