Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

The Trouble with Tor
eSecurity Planet ^ | 16 December 2014 | Paul Rubens

Posted on 12/17/2014 3:45:46 AM PST by ShadowAce

For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source technology, to protect U.S. government communications.

It is used by people living under restrictive regimes who want to access forbidden information or data on the Internet, whistle-blowers and dissidents who want to communicate with journalists, and anyone who wants to use the Internet without being tracked or to publish information on the Net without compromising their privacy.

How Tor Works

Tor works by sending traffic from its source to its destination via a random series of Tor relays around the world. Traffic is encrypted each time it goes from one relay to the next, and any given relay only knows where it got the traffic from and its next stop. Only the last, exit node knows the ultimate destination; it decrypts the traffic as it leaves the Tor network.


Using Tor "rendezvous points" it is also possible to offer a "hidden service" such as an anonymous website whose owners and location can't be traced.

There are thousands of Tor relays around the world and millions of people rely on them. (Anyone can set one up.) NSA documents leaked in 2013 describe Tor as "… the king of high secure, low latency Internet Anonymity," adding that …"there are no contenders for the throne in waiting."

That was then. But now Tor appears to have problems.

Tor's Travails

Perhaps the most obvious illustration of this is the seizure of the Silk Road 2.0 drugs marketplace and the arrest of a San Francisco man thought to be behind the site, which operated as a hidden Tor service. It's believed that Silk Road 2.0 was compromised by a Homeland Security Investigations undercover agent rather than a technical weakness in the Tor system, but the arrest highlights the fact that using Tor does not guarantee anonymity.

In fact, using Tor can actually attract interest from law enforcement and security agencies. Earlier this year it was revealed that the NSA's XKeyScore program is likely to place Internet users who use Tor, or who visit its website to learn about it, on a list of extremists. So, ironically, by attempting to be anonymous on the Internet you may well put yourself directly in the NSA's spotlight.

There are almost certainly technical weaknesses in Tor and how it is used as well.

In July Tor announced in a blog post that unknown attackers had set up a number of Tor relays and modified the traffic passing through these relays to attempt to identify users of hidden services. Users who had accessed or operated hidden services from a period of about five months to July 4, 2014 should assume that their identity had been compromised, the blog post advised.

Another problem with using Tor is that if the user's machine is compromised by malware, then using Tor is no longer enough to stay anonymous. This was illustrated in August 2013, when a piece of malware called Magneto was discovered which exploited a hitherto unknown vulnerability in the Tor browser  which is commonly used to visit websites using Tor.

Not So Anonymous

The JavaScript exploit is widely believed to have been the work of the FBI, because it doesn't do anything to the compromised machine except send the machine's MAC address and Windows hostname to a server in Virginia using the machine's real IP address. The idea that the FBI could be involved with malware is not too outlandish; revelations from Edward Snowden have already revealed that the NSA does much the same thing.

More recently, a former researcher at Columbia University co-published research that claims that it is possible to identify 81 percent of Tor users using a variation of a technique called traffic analysis. Essentially it involves setting up a modified Tor relay, and then injecting traffic into a TCP connection and analyzing router flow records.

This is complicated stuff, but not so complicated that it would require the enormous resources of the NSA to carry it out, according to Professor Sambuddho Chakravarty.

That's a concern because some Tor relays on the Internet are very large and handle a huge volume of traffic, making them expensive to operate and maintain. An obvious question then is this: Who is picking up the bill? Given that many governments would like to know more about what people are doing on Tor, it doesn't take a huge stretch of the imagination to think that some of these may be operated by the national intelligence services of foreign governments.

Tor Alternatives

Despite the NSA saying there are no contenders to Tor's throne as king of Internet anonymity, alternatives do exist, including:

The Invisible Internet Project (I2P) is an anonymous overlay network, a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.

To anonymize the messages sent, each client application has their I2P "router" build a few inbound and outbound "tunnels" - a sequence of peers that pass messages in one direction (to and from the client, respectively). In turn, when a client wants to send a message to another client, the client passes that message out one of their outbound tunnels targeting one of the other client's inbound tunnels, eventually reaching the destination.

The project website for the open source I2P software warns that "no network can be 'perfectly anonymous.'" It says the continued goal of I2P is to make attacks more and more difficult to mount. "Its anonymity will get stronger as the size of the network increases and with ongoing academic review," it adds.

Freenet is free software which purports to let you anonymously share files, browse and publish "freesites" (websites accessible only through Freenet) and chat on forums. According to the project, an important recent development, which few other networks have, is a "darknet." By only connecting to people they trust, users can greatly reduce their vulnerability and yet still connect to a global network through their friends' friends and so on.

VPN services don't offer strong anonymity, because most require that you sign up with a service provider before using them; even those that don't require this can keep logs of the IP address where you connect from and which sites you visit.

Nonetheless, a VPN service does mask your IP address from websites you visit, providing a low level of anonymity. A VPN should be used with caution because a website may still be able to identify you through the use of cookies or other identifiers, especially if you visit an associated site without masking your IP address with a VPN.


TOPICS: Computers/Internet
KEYWORDS: government; privacy; tor

1 posted on 12/17/2014 3:45:46 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; Ernest_at_the_Beach; ...

2 posted on 12/17/2014 3:46:04 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Play safe out there.


3 posted on 12/17/2014 4:27:02 AM PST by glorgau
[ Post Reply | Private Reply | To 1 | View Replies]

To: glorgau

Yeah—Once I realized that anyone could set up an exit node, I figured the whole network was compromised.


4 posted on 12/17/2014 4:28:11 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce

The onion router works well enough to defeat the Facebook police and other intrusive social media sites that keep tabs on users ip addresses.


5 posted on 12/17/2014 5:08:50 AM PST by mac_truck ( Aide toi et dieu t aide)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
I think two sections of the article highlight the fact that Tor is STILL worth using:

It's believed that Silk Road 2.0 was compromised by a Homeland Security Investigations undercover agent rather than a technical weakness in the Tor system

Moral of the story: if you think you're invulnerable and act like you're invulnerable, you're not.

Another problem with using Tor is that if the user's machine is compromised by malware

First: see my previous comment. Second: if the Feds are injecting malware into computers on your network, you're gonna have a bad time.

Tor is an amazing tool, and you can bet that the Feds are not going to usurp a tool that they still use for secure communications until there's a better option. With all of the vulnerability announcements with SSL and TLS, it's only a matter of time before some university compsci lab comes out with new security standards that the Feds want to snoop into.

Fact is, guys, the Internet is a dangerous place. If you're not using a VPN, Tor, or, at a minimum, SSL, you can guarantee that you're being watched, tracked, and your behavior cataloged.

6 posted on 12/17/2014 5:37:57 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

I’ve tried Tor in the past but I am left with questions. First and foremost is, the setup comes with a Tor browser...a variant of Firefox. It is a lot slower and klugdey. Does this HAVE to be used or can Tor be set up for use with your browser of choice?


7 posted on 12/17/2014 7:09:57 AM PST by Bloody Sam Roberts (Laws that forbid the carrying of arms disarm only those who are not inclined to commit crimes.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Bloody Sam Roberts

There are Tor-specific plugins for FF and other browsers. Go to TorProject and DL their browser. And yes, it’s going to be slow, it’s deliberately obfuscating your connections, so it’s not a direct connection like usual.


8 posted on 12/17/2014 7:55:52 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 7 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson