Top
Best
New

Posted by pantalaimon 10/25/2024

Law Enforcement Undermines Tor(marx.wtf)
105 points | 78 comments
dang 10/25/2024|
Recent, related, and cited:

Is Tor still safe to use? - https://news.ycombinator.com/item?id=41583847 - Sept 2024 (562 comments)

cedws 10/25/2024||
I have suspected Tor has been busted for quite a long time. LE is only using this power selectively for now - the last thing that they want is to scare users away lest they go and build something more secure.

The Nym mixnet[0] seems promising but it's still new and unproven.

I had an idea a while back to make traffic analysis more difficult by building circuits distributed across adversarial countries. Would like to hear thoughts on it.[1]

[0]: https://nymtech.net/about/mixnet

[1]: https://cedwards.xyz/adversarial-routing/

amy-petrik-214 10/26/2024||
It's a basic correlation attack. As follows:

- Find the "bad guy" server onion address "hidden service"

- Run a tor relay. Ideally many. No exit node shenanigans needed - hidden service, not exiting TOR. This is quite nice from a legalistic perspective since you're not on the hook for hacks coming off the exit node.

- Run a bunch of clients. Instruct to connect to "bad guy" onion.

- Gather data over time for correlation attacks. Correlate your client to relay to endpoint server.

- At some point, you'll find one of your relays is the guy connecting directly to said hidden service.

Very simple lesson here. One needs to encrypt the information, yes, but failing to consider packet timing as "information" is the fallacy.

mdhb 10/25/2024|||
The public tends to have a very strange idea as to a lot of things on this topic while forgetting that TOR itself was actually a department of defence project or NSW I forget originally.

If you’re interested in seeing what the next generation of this stuff looks like (although AFAIK is not really known outside of defence contracting circles) take a look at this https://github.com/tst-race/race-docs/blob/main/what-is-race...

shavanerad 10/26/2024|||
Tor was originally designed by a mathematician working for the US Naval Research Lab (NRL) to provide a way for MI agents to "phone home" safely from the field. It very quickly became clear that if only mil used it, it created anonymity about as effective as Batman on a rooftop backlit by a spotlight -- you didn't have a name but you knew precisely what the agent was about, and where.

So he persuaded NRL to give the project up to open source. Good thing, too, because he was a math geek but not a cryptographer. The two cryptology doctoral candidates at MIT who took the project over chucked his code, and rewrote Tor from the ground up.

Since it's open source, this can be documented. Getting spooky about it being designed for spooks is a red herring.

That GitHub doc vaguely mischaracterizes Signal -- all Signal ever sees is the connection negotiation metadata. Past that point there are no "servers" involved, or data to be retained for future discovery.

roastedpeacock 10/27/2024||
I was under the impression that the Signal server, if compromised could be utilised to potentially log metadata of communication between contacts. Sealed sender [1] is a feature of the Signal protocol to mitigate overt metadata retention but it may fail against certain correlation attacks.

[1]: https://signal.org/blog/sealed-sender/

GTP 10/25/2024|||
> The public tends to have a very strange idea as to a lot of things on this topic while forgetting that TOR itself was actually a department of defence project or NSW I forget originally.

IIRC it was a US Navy project. But I didn't understand your point.

mdhb 10/25/2024||
NSW = Naval Special Warfare but yes somewhere within the alphabet soup that is US natsec
GTP 10/25/2024||
But, apart from that, I don't understand your point about it being a military project.
salawat 10/25/2024||
People don't understand Federal entities aren't monolithic. Even within a single agency, you'll have teams doing both offensive (Red Team), and defensive (Blue Team) work.

People think that just because the research came out of the Navy, it was busted or compromised from the start, which it wasn't. Efforts only spun up to wrangle it in from being an academic curiosity once it started being heavily noticed as being a frequent tool/vector in investigations of criminal/adversarial activity.

Jerrrrrrry 10/25/2024||
[flagged]
j-bos 10/25/2024||
One advantage of imperfect privacy solutions like Tor is they force authorities to invest if they want to snoop. In the before times if soneone wanted to read your mail they'd need to at least convince a judge and then spend manpower interecepting the envelopes, today they can just ping google for a bcc.
Cthulhu_ 10/25/2024|
Is that true? IIRC they still need to do the legal paperwork to get an email from google et al (FISA request?).
c0wb0yc0d3r 10/25/2024|||
Yes paper work is required. I think OP is pointing out that that it doesn’t require the same amount of work it used to. Especially from law enforcement.
mdhb 10/25/2024||
LE are mostly avoiding this by just buying from the same public ad network sources that everyone else does and using that as a way to avoid the paperwork, I know people get very pissy about EUs GDPR sometimes but if you want to put an end to that kind of thing you need to tackle the private sector collection problem which almost anyone can access and is comparable with mid tier nation state capabilities.
mdhb 10/25/2024|||
Yes mostly true, exceptions apply mostly based on jurisdictions and capabilities.

The safeguards are actually much much better than what the opinions would lead you to believe on here.

People really seem to get off on the idea that they are on the targeting list of an intel service but you actually have to put in some real work to meet that criteria. If you’re buying drugs for example even the relevant LE authorities will at most knock on your door to scare you assuming you live in an English speaking jurisdiction.

rustcleaner 10/25/2024||
The dark network of the future will be an onion-routed Hyphanet/Freenet, with monthly "bandwidth quotas" that make links communicate uniformly at X GB/hr regardless of traffic (padding when there is none) until the monthly quota is hit right at the end of the month. If internodal links don't vary in externally measurable ways when utilized, netflow is diminished.
Jerrrrrrry 10/25/2024||
I2P with more steps and crypto-enforced minimum quotes to deter timing/correlative attacks.

Minimally-enforced "random" timeouts to prevent DDoS->outage correlation.

Also mirrors. Lots of mirrors.

Have mirrors tied to reputation tied to invites.

Then the border to entry is time + money + reputation(which is time + money)

Throw in some 0-KPz, and you are 100% chillin in Belize or 100% in Colorado-ADX

(in minecraft, hypothetically, to sell beets, i ♥ us)

orbisvicis 10/25/2024||
Doesn't i2p also use this model?
immibis 10/25/2024||
i2p is a bit harder because the circuits aren't end-to-end. Your traffic goes through typically 3 relays, then an all-to-all mixing where it goes directly to the start of the recipient's relay chain, then 3 of their chosen relays. A new connection is NOT set up through the whole network for each overlay connection - it uses your same outgoing relay chain, and your last relay sends the packet to the first relay in the recipient's incoming relay chain.

It also uses a separate chain in each direction which makes any attack based on observing timing both ways more difficult.

It's also not Sybil resistant at all.

sandworm101 10/25/2024||
Time for nodes to inject some random traffic. It sounds like if even 0.1% was random fluff they would not be able to track packets between nodes.
Jerrrrrrry 10/25/2024|
That time happened 10 years ago.

.1% fluff? May as well call em up yourself.

jagged-chisel 10/25/2024||
Is there something new here? I’m under the impression that we knew this kind of thing was possible with enough resources.
noirscape 10/25/2024||
Nothing new, and I'm pretty sure these sorts of attacks have been possible and used ever since it's founding.

TOR ultimately works like any old relay system; if you control enough nodes, you can effectively decloak people if they happen to connect to only your nodes. Nodes are assigned for connection based on a trust value so all a Nation state would have to do is host enough nodes (relay+exit) and they'd be able to decloak a connection. This kinda inherently gives TOR decloaking abilities to entities with the most infrastructure, which at that scale basically will only be nation states.

TOR works well enough for privacy when your adversaries aren't well-funded state actors. (ie. It's probably enough to mask your traffic if you use TOR to access resources to get out of an abusive relationship or need to circumvent cult-level inspection of your personal interests by religious schools. Most dictatorships also don't really have the resources to mount this sort of attack - it's probably just the US and some European countries.) That rule kinda also goes for VPNs in general however.

shavanerad 10/26/2024|||
There are thousands of relays run by altruistic volunteers. Unless your opsec sucks (i.e. you configure Tor to favor performance and not swap circuits every ten minutes) the opportunity to correlate by malicious nodes is small.

Also, these nodes operated by bad actors are constantly identified and excluded.

rmarq10 10/25/2024|||
The articled confirms that the authorities are conducting a dragnet operation. Everyone who connected to a certain entry relay was tracked and reported.

Does the tor daemon connect automatically? If so, even people who installed tor for fun and forget about may be on the list.

Did the lucky ones have the "Bundestrojaner" (gov surveillance app) installed on their machines?

potato3732842 10/25/2024|||
>If so, even people who installed tor for fun and forget about may be on the list.

Good. That reduces the quality of the list.

immibis 10/25/2024|||
They selected that relay after they determined it was the one used by the person they were trying to go after. That isn't a dragnet.

There probably is a dragnet too.

SamuelAdams 10/25/2024|||
Plenty of people still believe that using a VPN + Tor means they are “private”. What we need to teach others is that this is no longer the case - privacy is not a one size fits all solution. You may be private from other users on your network, but not nation state actors.
upofadown 10/25/2024||
VPN/Tor provide something else anyway: anonymity. Privacy is a different thing. You can lead an entirely private life in an environment where everyone knows who you are and who you interact with. They just don't know how you are interacting with those people.

Most people don't need anonymity most of the time...

mdhb 10/25/2024||
Really curious on your definition of private here because I have a buttload of evidence that says that is entirely untrue and you can as a private citizen buy detailed demographic and location data at an easily identifiable level for people without even needing to talk to another person.
immibis 10/25/2024||
I think the surprising element is that the German government actually deployed enough resources.
Smurfix 10/29/2024||
They knew that the target had nearly half a million [child ab]users.

That's sufficient motivation right there.

The problem is that once you have the infrastructure you can go after, well, any other random Tor onion service you damn well please, all with a minimum of judical oversight (if any).

dialup_sounds 10/25/2024||
It's not directly mentioned in this article, but the four deanonymized users were admins of a CSAM site with hundreds of thousands of users. If you're concerned about being targeted by law enforcement, step one is probably: don't be that.

https://www.dw.com/de/darknet-missbrauchsplattform-boystown-...

https://www.sueddeutsche.de/panorama/kindesmissbrauch-boysto...

mingus88 10/25/2024||
Cool, we got the “if you don’t have anything to hide” argument out of the way early.

Now we can discuss the actual privacy implications of this news

dialup_sounds 10/25/2024||
Are you discussing the privacy implications? It looks like your only comment is this asinine middlebrow dismissal. Meanwhile, I've given actionable advice.
Brian_K_White 10/25/2024||
I don't think you get to charge anyone else with assinine.

If a tool does not perform as designed, all users of the tool have an interest in knowing that, and working towards correcting that.

It doesn't matter that there are both good and bad users.

dialup_sounds 10/26/2024||
The tool performed as designed. This took a months-long international investigation using social engineering and monitoring of hundreds of nodes to to identify four users that were being specifically targeted. It wasn't some novel attack, it's literally something that has always been possible with enough resources.

Ergo, users: don't warrant the resources. Your threat model should not be the same as CSAM site operators.

Also, you misspelled asinine.

shavanerad 10/26/2024||
Most attacks on Tor are through social engineering. Think DPR. Error occurs between keyboard and chair.

Tor can't protect you from terrible opsec.

mmzm 10/25/2024||
This is what everyone here seems to forget when they're ranting on about surveillance: that there are serious criminals out there who need to be caught. In this case, child abusers.

Whoever the engineers are who've worked on the technical aspects of deanonymizing Tor connections, they should feel very proud of their work and the good it's doing in the world.

bananamango 10/25/2024||
Split EntryGuard should help, means you connect to multiple of them instead of one, and your data is split between them then it gets to Exit through multiple paths (Middle Nodes) and there it is reconstructed to one data stream. How about that?
bananamango 10/25/2024||
Connecting through multiple EntryGuards should help in this situation, Tor should split data transfer to many smaller ones travelling through different paths (Entry+Midddle) and then get it reconstructed to one stream at ExitNode.
ementally 10/25/2024|
Are there any projects that generates random traffic? Like a website where you have it open it keeps sending random traffic. It will make traffic analysis very hard.
Brian_K_White 10/25/2024||
Decades ago when first hearing about timing attacks I thought every network switch and nic should generate essentially white noise at all times on the wire, with the actual traffic just mixed in. Random amounts of random data going to random destinations, completely filling the pipe 100% at all times like how a carrier wave is on at all times, just as a feature of lighting up the port. If the electricity is on, the noise is on. Or at least in the switches and maybe not needed at the end points.

A fantasy.

mdhb 10/25/2024|||
As I mentioned elsewhere in this thread if you’re looking for proper state of the art it’s coming out of DARPA projects and you can see what I mean here https://github.com/tst-race/race-docs/blob/main/what-is-race...
Cthulhu_ 10/25/2024|||
It probably doesn't; think about it, most websites already have a load of random stuff, plus all users combined is also heaps of randomness. No self-respecting analyist would go through logs manually, it's all fed into search / analysis software, filtering through noise.
ementally 10/25/2024||
Depends, it is a very well-known attack vector https://www.whonix.org/wiki/Speculative_Tor_Attacks#Website_...
BonusPlay 10/25/2024|||
Yes, loopix.

https://www.usenix.org/conference/usenixsecurity17/technical...

boltzmann64 10/25/2024||
It is already hard with bots drowning any legit traffic, and you want to add random traffic too.
More comments...