I’ve heard a lot of people on the left argue that Tor is likely backdoored because it was created by the U.S. Navy for spies to communicate and is still funded by the government. Yasha Levine has written a lot about this:

He also appeared in TrueAnon episode 50 to talk about this.

On the other hand, a lot of people in the crypto and tech community disagree with this. They believe that Tor is not backdoored for one or both of the following reasons:

  • Tor is open-source and has been audited.
  • The U.S. Government would never do such a thing.

They also point to a leaked NSA presentation from 2007 that admits the NSA can’t deanonymize Tor users.

What are your thoughts?

33 points
*
Deleted by creator
permalink
report
reply

To my knowledge they have their techniques to deanonymize people, in a targeted manner, but at its core I don’t believe the protocol is backdoored.

Yeah, if I remember correctly, when the feds took down the Silk Road dude they basically had to hack a server inside the TOR network to serve exploit code that forced the browser to bypass the TOR network. There was a couple of months where everyone was freaking out because there was a sudden influx of people complaining that they were unexpectedly making unsecured requests to some server in langley or something like that.

I’m not even sure if it was a hacked server… I seem to remember them busting a hosting provider popular for TOR servers on the claim of child pornography and then suddenly all the servers owned by that provider began serving up dodgy code.

permalink
report
parent
reply
12 points
*
Deleted by creator
permalink
report
parent
reply
3 points
*

they have actually dropped ** cases in order to hide their methodology.

Wow.

Also, damn.

Edit: thinking about this further, they’re probably like “damn Epstein 2.0, do better opsec. Also, come work for us lol.”

permalink
report
parent
reply
3 points
*

javascript exploits

To expand upon this, interested parties should look up “canvas fingerprinting.JS HTML5 contains within it certain functions that a server can use to query information about your system, setup, and display (such as resolution of the window loading the resources, custom fonts being displayed by the system, etc.), and if your setup is weird/unique enough, it can form a “fingerprint” of your oddities which can be used to track you across the web. This is why TOR’s instructions tell you not to resize the window. If everyone runs the TOR browser at the default resolution, that is one less oddity that can be used to track individuals.

permalink
report
parent
reply

It’s not so much that they have to get into “a server inside the tor network” but they can go after users of tor hidden services if they somehow track down the server hosting that particular hidden service, but the whole system is built around making that very difficult.

Yes! Hidden services was what I was talking about. It’s been a while. :grinning face with sweat:

Those links you posted were what I was talking about. I know they claimed to have gotten the Silk Road dude over him using the same username, but I remember at the time (along with the timeline of the hack) that it all stank of parallel construction so they wouldn’t have to admit to the hack.

permalink
report
parent
reply
16 points

The U.S. Government would never do such a thing.

Hahahahahahahahahaha

permalink
report
reply

A lot randos on Hacker News believe that :rolling on the floor laughing:

permalink
report
parent
reply
12 points
*

A lot randos undercover feds on Hacker News believe that 🤣

FTFY

permalink
report
parent
reply
11 points

Hacker News users really are dumb enough to believe that though

permalink
report
parent
reply
3 points
*
Deleted by creator
permalink
report
parent
reply
14 points
*

I think it’s not backdoored precisely because it was created by the US Navy for spy communications. The US government knows full well that any backdoor they put in for themselves could (and, eventually, would) be found and exploited by other intelligence agencies, rendering the whole project useless for its original purpose. I’m not saying the US government has some ethical objection to lying and spying, but it’s in their best interest here to make tor as secure as they say it is.

That’s not to say it’s flawless, but I doubt the flaws are deliberate.

permalink
report
reply

The encryption is probably not broken but the government can, and probably has:

The ability to detect tor traffic at the customer facing interface of an ISP, which would deanonymize tor traffic

The ability to buy thousands of tor nodes at under $100 a piece, including entry/exit nodes, and use aggregate data to determine the location and identity of webservers

The control of a lot of VPNs, which will log your usage of tor traffic

permalink
report
reply

And don’t forget the cooperation of every american ISP and probably a bunch of other NATO ISPs too. Long story short, if the US gov ever has a reason to target you specifically, maybe just don’t use the internet anymore

permalink
report
parent
reply
8 points

We’re never gonna hear from Brace again

permalink
report
parent
reply
6 points
*

Long story short, if the US gov ever has a reason to target you specifically, maybe just don’t use the internet anymore you’re probably screwed unless you are ready and able to physically defend yourself or just leave the country.

But if you want to avoid giving them a reason to target you, tor is very useful.

permalink
report
parent
reply
5 points
*
Deleted by creator
permalink
report
parent
reply

This isn’t really true. All they can tell is that there is tor traffic, and tor works to make it as indistinguishable from normal ssl traffic as possible, iirc.

They can tell that a specific household is using tor, which makes it not anonymous, I said that it doesn’t mean decryption. TOR traffic does not behave like SSL traffic.

If you are referring to this, it relies on being able to fingerprint the hidden service traffic by size and frequency of packets, which is easy for the hidden service to thwart, on top of needing to operate a large quantity of not only nodes, but specifically entry guard nodes, and the algorithm for choosing has been changed over the years to limit the impact of attacks like this.

I’m not referring to that, the whole point of security at the transportation (edit meant network layer) layer is pretty much pointless when the ends are compromised, and it is very cheap to do so.

If you’re doing VPN to Proxy to TOR or whatever then TOR isn’t what’s providing you security, you’re just using it to access TOR content.

permalink
report
parent
reply
2 points
*
Deleted by creator
permalink
report
parent
reply

Any recommendations for VPNs? I’ve seen recommendations to make your own but that reduces to the problem of an anonymous host for it.

permalink
report
parent
reply

I don’t do anything fun over the Internet anymore so I don’t really use one. If the CIA starts guantanamoing chapo.chat users I guess I’m just fucked.

permalink
report
parent
reply

why would they dissappear a bunch of libs?

permalink
report
parent
reply
3 points
*
Deleted by creator
permalink
report
parent
reply
3 points
*
Deleted by creator
permalink
report
parent
reply
11 points

Tor is not backdoored [because] the U.S. Government would never do such a thing.

I’ve never met a cryptologist who isn’t convinced everything needs to be perfect and impenetrable because the US government could go rogue at any second. Including several who work at the NSA lol.

permalink
report
reply
4 points

Yeah I do cryptography research and this is the opinion of everyone I’ve worked with. For example everyone is convinced that NSA broke some of the curves used in eclipitic curve crypto so no one will use them and people are constantly obsessing over finding new curves.

permalink
report
parent
reply

technology

!technology@hexbear.net

Create post

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

  • 1. Obviously abide by the sitewide code of conduct. Bigotry will be met with an immediate ban
  • 2. This community is about technology. Offtopic is permitted as long as it is kept in the comment sections
  • 3. Although this is not /c/libre, FOSS related posting is tolerated, and even welcome in the case of effort posts
  • 4. We believe technology should be liberating. As such, avoid promoting proprietary and/or bourgeois technology
  • 5. Explanatory posts to correct the potential mistakes a comrade made in a post of their own are allowed, as long as they remain respectful
  • 6. No crypto (Bitcoin, NFT, etc.) speculation, unless it is purely informative and not too cringe
  • 7. Absolutely no tech bro shit. If you have a good opinion of Silicon Valley billionaires please manifest yourself so we can ban you.

Community stats

  • 16

    Monthly active users

  • 5.1K

    Posts

  • 60K

    Comments