I’ve heard a lot of people on the left argue that Tor is likely backdoored because it was created by the U.S. Navy for spies to communicate and is still funded by the government. Yasha Levine has written a lot about this:

He also appeared in TrueAnon episode 50 to talk about this.

On the other hand, a lot of people in the crypto and tech community disagree with this. They believe that Tor is not backdoored for one or both of the following reasons:

  • Tor is open-source and has been audited.
  • The U.S. Government would never do such a thing.

They also point to a leaked NSA presentation from 2007 that admits the NSA can’t deanonymize Tor users.

What are your thoughts?

You are viewing a single thread.
View all comments View context
12 points
*
Deleted by creator
permalink
report
parent
reply

It’s not so much that they have to get into “a server inside the tor network” but they can go after users of tor hidden services if they somehow track down the server hosting that particular hidden service, but the whole system is built around making that very difficult.

Yes! Hidden services was what I was talking about. It’s been a while. :grinning face with sweat:

Those links you posted were what I was talking about. I know they claimed to have gotten the Silk Road dude over him using the same username, but I remember at the time (along with the timeline of the hack) that it all stank of parallel construction so they wouldn’t have to admit to the hack.

permalink
report
parent
reply
3 points
*
Deleted by creator
permalink
report
parent
reply

The case of freedom hosting, however, is more interesting, as I discussed above.

I mean, the thing about TOR is it relies on its distributed nature to help obfuscate traffic. When you’ve got access to the literal backbone of the internet, as we know is largely kind of the case. See: Room 641A Hunting down the location of a Hidden Service ceases to be an impossible task. Not easy, but no more impossible than spinning up enough of your own exit relays to map synchronous traffic.

jfc, this conversation is becoming a total trip down memory lane. I’m remembering years of arguments during the 90’s with people over whether or not ECHELON was real. brb gotta go build a Faraday cage in the woods.:grinning face with sweat:

permalink
report
parent
reply
7 points
*
Deleted by creator
permalink
report
parent
reply
2 points

Another reminder to never reuse usernames and passwords on the internet.

permalink
report
parent
reply
3 points
*

they have actually dropped ** cases in order to hide their methodology.

Wow.

Also, damn.

Edit: thinking about this further, they’re probably like “damn Epstein 2.0, do better opsec. Also, come work for us lol.”

permalink
report
parent
reply
3 points
*

javascript exploits

To expand upon this, interested parties should look up “canvas fingerprinting.JS HTML5 contains within it certain functions that a server can use to query information about your system, setup, and display (such as resolution of the window loading the resources, custom fonts being displayed by the system, etc.), and if your setup is weird/unique enough, it can form a “fingerprint” of your oddities which can be used to track you across the web. This is why TOR’s instructions tell you not to resize the window. If everyone runs the TOR browser at the default resolution, that is one less oddity that can be used to track individuals.

permalink
report
parent
reply

technology

!technology@hexbear.net

Create post

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

  • 1. Obviously abide by the sitewide code of conduct. Bigotry will be met with an immediate ban
  • 2. This community is about technology. Offtopic is permitted as long as it is kept in the comment sections
  • 3. Although this is not /c/libre, FOSS related posting is tolerated, and even welcome in the case of effort posts
  • 4. We believe technology should be liberating. As such, avoid promoting proprietary and/or bourgeois technology
  • 5. Explanatory posts to correct the potential mistakes a comrade made in a post of their own are allowed, as long as they remain respectful
  • 6. No crypto (Bitcoin, NFT, etc.) speculation, unless it is purely informative and not too cringe
  • 7. Absolutely no tech bro shit. If you have a good opinion of Silicon Valley billionaires please manifest yourself so we can ban you.

Community stats

  • 16

    Monthly active users

  • 5.1K

    Posts

  • 60K

    Comments