PRISM vs Tor

By now, just about everybody has heard about the PRISM surveillance program, and many are beginning to speculate on its impact on Tor.

Unfortunately, there still are a lot of gaps to fill in terms of understanding what is really going on, especially in the face of conflicting information between the primary source material and Google, Facebook, and Apple's claims of non-involvement.

This apparent conflict means that it is still hard to pin down exactly how the program impacts Tor, and is leading many to assume worst-case scenarios.

For example, some of the worst-case scenarios include the NSA using weaponized exploits to compromise datacenter equipment at these firms. Less severe, but still extremely worrying possibilities include issuing gag orders to mid or low-level datacenter staff to install backdoors or monitoring equipment without any interaction what-so-ever with the legal and executive staff of the firms themselves.

We're going to save analysis of those speculative and invasive scenarios for when more information becomes available (though we may independently write a future blog post on the dangers of the government use of weaponized exploits).

For now, let's review what Tor can do, what tools go well with Tor to give you defense-in-depth for your communications, and what work needs to be done so we can make it easier to protect communications from instances where the existing centralized communications infrastructure is compromised by the NSA, China, Iran, or by anyone else who manages to get ahold of the keys to the kingdom.

The core Tor software's job is to conceal your identity from your recipient, and to conceal your recipient and your content from observers on your end. By itself, Tor does not protect the actual communications content once it leaves the Tor network. This can make it useful against some forms of metadata analysis, but this also means Tor is best used in combination with other tools.

Through the use of HTTPS-Everywhere in Tor Browser, in many cases we can protect your communications content where parts of the Tor network and/or your recipients' infrastructure are compromised or under surveillance. The EFF has created an excellent interactive graphic to help illustrate and clarify these combined properties.

Through the use of combinations of additional software like TorBirdy and Enigmail, OTR, and Diaspora, Tor can also protect your communications content in cases where the communications infrastructure (Google/Facebook) is compromised.

However, the real interesting use cases for Tor in the face of dragnet surveillance like this is not that Tor can protect your gmail/facebook accounts from analysis (in fact, Tor could never really protect account usage metadata), but that Tor and hidden services are actually a key building block to build systems where it is no longer possible to go to a single party and obtain the full metadata, communications frequency, *or* contents.

Tor hidden services are arbitrary communications endpoints that are resistant to both metadata analysis and surveillance.

A simple (to deploy) example of a hidden service based mechanism to significantly hinder exactly this type of surveillance is an XMPP client that also ships with an XMPP server and a Tor hidden service. Such a P2P communication system (where the clients are themselves the servers) is both end-to-end secure, and does *not* have a single central server where metadata is available. This communication is private, pseudonymous, and does not have involve any single central party or intermediary.

More complex examples would include the use of Diaspora and other decentralized social network protocols with hidden service endpoints.

Despite these compelling use cases and powerful tool combination possibilities, the Tor Project is under no illusion that these more sophisticated configurations are easy, usable, or accessible by the general public.

We recognize that a lot of work needs to be done even for the basic tools like Tor Browser, TorBirdy, EnigMail, and OTR to work seamlessly and securely for most users, let alone complex combinations like XMPP or Diaspora with Hidden Services.

Additionally, hidden services themselves are in need of quite a bit of development assistance just to maintain their originally designed level of security, let alone scaling to support large numbers of endpoints.

Being an Open Source project with limited resources, we welcome contributions from the community to make any of this software work better with Tor, or to help improve the Tor software itself.

If you're not a developer, but you would still like to help us succeed in our mission of securing the world's communications, please donate! It is a rather big job, after all.

We will keep you updated as we learn more about the exact capabilities of this program.

Anonymous

June 10, 2013

Permalink

Mobile devices are used much to access the internet. There are free apps available from the Guardian Project for Android but I don't see any mention in the download section of free apps for Apple iOS. Why is that. That is not a criticism as I appreciate what the Tor project does but as mobile devices could become the most used means to access the internet in the near future you could give some information on free apps for Apple devices.

Anonymous

June 10, 2013

Permalink

You're not in the business of reviewing tools, but since you mentioned a few I'm curious whether you or anyone has an informed perspective on Gliph (http://www.gli.ph), an iOS/Android/web-based app that promises 256-bit encrypted p2p messaging. It's hard to validate developers' claims.

Anonymous

June 10, 2013

Permalink

Hi, Are I2P and Freenet models the best options for privacy & security? Approximately how soon before upgraded encryption is actually implemented and used for the Tor? Will there be a flag day getting it online? Thanks

I2P's communication model is similar to Tor's hidden services, and against a passive adversary probably has similar metadata analysis resistance properties.

However, I2P does not attempt to strongly authenticate the network routers or network membership. This makes it more vulnerable to router impersonation, route manipulation, route capture, and Sybil attacks than Tor is.

Tor also has its own variety of route capture attacks, but because of the consensus and authenticated network membership, we're in a better position to defend against them.

I2P's RSA key lengths appear to be the same as Tor's.

Beyond that, I2P's scant protocol documentation makes it hard to comment much further.

I know even less about Freenet, but last time I checked, it did not support arbitrary stream-based communications that would be required for doing cool stuff like Diaspora, or even realtime chat.

Anonymous

June 10, 2013

Permalink

Mobile Users:
The Onion Browser for iOS is free, in the Apple App Store, as well as ChatSecure, an XMPP App with OTR built in.

Anonymous

June 10, 2013

Permalink

I would love to support Tor but until all pedophile .onion sites are deleted and not allowed within the Tor network I can't. Many others feel the same way.

The ability to censor any onion sites would compromise Tor in a way that would render its most compelling features useless.

See also: https://www.torproject.org/docs/faq-abuse.html.en#RemoveContent

TL;DR: If people are going to post evidence of their child abuse crimes online, shouldn't police be using that evidence to infiltrate the abuse rings, find the children, and stop the abuse, rather than simply trying to hide it?

This is not to say that any search engines that index .onion (or the Internet) couldn't or shouldn't take these sites out of their index to make them harder to find (especially accidentally), but adding the ability to shut down arbitrary endpoints is not the right solution.

People should have "moral compasses," if indeed there were such a thing. And they should all be pointing the one true way, I guess. And everybody should be guided by them. Hurray? Tor should have a moral compass? And telephony too, I'll bet. And fiber optics, copper, cars, guns, knives, pen & paper? A very foolish notion. Stipulated: the very sun itself should not shine on pedophiles, and they should all trip and fall down, and remain unable to rise. Well, you've certainly established your moral bona fides -- no Tor for you until it's not Tor!

It would seem to me that the more people who view "pedo/CP" material and sites, the more chances for predators to be exposed and their victims identified.

I am fairly certain that at least one child-rapist is now, finally, behind bars as a direct result of evidence I saw at a "pedo"-oriented site and acted-upon. Yet, both myself as well as the people who cooperated with me put ourselves at risk in coming forward and presenting the evidence.

"Sunlight is the best disinfectant."

And especially the scams, because of course the "hired assassins" are fake. And the panhandlers, they are a nuisance. And once we do that, we can get down to business and have a central committee decide what people are allowed to say to each other.

Because they, and several other offers of illegal activity came into existence at the same time. They all demanded the exact same amount of money, regardless of the service offered. They all required up-front payment and some of them were obviously fraudulent.

It boggles my mind how people can put credit in things like that with all of the outrageous things that are in hidden services, I2P, the public Internet and the like.

There is no comparison or justification for Tor not to do anything about the abuse and sexual exploitation of children that is happening on .onion sites. I hope I am wrong and I hope they're secretly working with crime agencies around the world to get all these pedos locked up and that is why so many .onion pedo sites exist. Tor is known as a pedohaven on every popular site..that's practically the only thing Tor is known for on any website, forum, or chan board.

Perhaps if you were abused and molested and video recorded like I was and found a video of your young self being raped on a popular .onion pedo site, you'd feel way different about all of this. Freedom of speech shouldn't include the protection of pedophiles to upload CP content, share it, download it and discuss it.

Sorry but I just have to reply.

Censor the Abuse and Sexual exploitation of Children! Save the Children! NOW!

Perhaps you should review some recent history. There was this little governmental take over in Germany oh not so long ago. One of their main tactics to impress restrictions upon its citizens was to declare "It is for the sake of our children!"

Citation: Mein Kampf

Freedom has its bad points. CP is one of them. But, it is not bad enough to give up ANY freedom.

I'm sorry you had to go through what you did. The individual who did so had no right to take away your freedom to not be raped.

"There is no comparison or justification for Tor not to do anything about the abuse ..."
I might as well say that there is no justification for you to not end violence. The people working on the Tor Project don't have any more ability to stop CP than you do to end warfare. You don't seem to understand how these things work.

"that's practically the only thing Tor is known for on any website, forum, or chan board. "
The sites that I visit know Tor for very different things (such as helping the Iranian protestors communicate when Iran tried to block social media, helping Chinese people learn about Christianity and helping people report crimes without fear of retaliation). The Tor Project maintains a list of some of their users here:
https://www.torproject.org/about/torusers.html.en

Included in the list are children. If you don't use Tor, then your location could be traced by others online. I know how to trace the origin of emails, for example. Others are much better at it than I am. If you don't want some pedo who's noticed your kid online to be able to push a button and find out where your kid is, then have your kid use Tor. If you don't use Tor, you can be traced by criminals as easily as by cops.

"Perhaps if you were abused ... like I was ... you'd feel way different about all of this."
Perhaps if you would read "What Colour are your bits?", then you would understand that what you're asking for is impossible. If it were possible to take down sites that violate US law, then it would also be possible to take down anything else, including things that violate Chinese law, such as discussions about democracy. It isn't about people not caring. It just can't be done.

What Colour are your bits?: http://ansuz.sooke.bc.ca/entry/23

Here's something I really don't understand:
Would that crime really have hurt you that much less if there wasn't a video online?

It seems to me like the actual abuse would be bad enough that a video shouldn't make it much worse. It's terrible either way. Even destroying Tor completely wouldn't have prevented most of the pain. It would only destroy the good uses.

CP came before Tor. Molestation came before CP. Both will outlive Tor by centuries.

If Tor were weakened sufficiently that it was possible to remove CP from it, then it would be possible to trace all its users, including Reporters without Borders and Human Rights Watch. Putting a tiny dent into child abuse by shutting down or weakening Tor, even if it were possible, wouldn't be worth the damage done to NGOs. Many good people would be tortured and killed, probably including children.

By the way, how is it that you've spent enough time on pedo sites to have discovered a video of yourself? If you posted something about me on one of those sites, I'd never find out. I'm starting to wonder if you just made that up.

While I agree with most of what you wrote, a little more sensitivity (and affording the benefit of the doubt to; assuming good faith) to the poster you are replying-to is in order.

"By the way, how is it that you've spent enough time on pedo sites to have discovered a video of yourself?"

Logic fail.

Spending any considerable length of time at the sites in question is not necessary in order for the claim in question to be plausible.

(Besides which, I don't agree that merely *viewing* *anything* should, in and of itself, be considered a crime.)

Re: "drug sites":

-What about, for example, chemotherapy patients, many of whom are dying anyway?
Would you deny them the little respite and relief they claim that marijuana provides them?

Current drug policy in many places does just that, leaving such people-- in misery-- with no alternative but the very "black markets" that you refer-to.

- Alcohol is a DRUG that is at least as deadly and claims at least as many lives as any number of substances that don't enjoy the blessings of the law and social acceptance.

What about "taking down" some of the (legal, sanctioned, privileged) mega corporations that promote, glamorize and glorify this poison?

Re: "money laundering": Can whatever Tor may facilitate in this regard even hold a candle to the likes of the Wall Street banksters or even (or especially) the Federal Reserve, the World Bank, etc., et al?

Not that two wrongs make a right but perspective is needed.

http://arstechnica.com/tech-policy/2012/06/fbi-halted-one-child-porn-in…

>wangstramedeous | Ars Praetorian Tue Jun 12, 2012 1:55 pm

>Child pornography is a symptom of a larger malaise in society, namely child abuse and exploitation. Simply putting so much emphasis on one medium of distribution (media delivered via the internet) suppresses and ignores what is going on all around us. Really, its a snap shot of a reality that is part of the fabric of society. Destroying the evidence of it in one aspect does nothing to address it.

>It is simply an act of making unseen what is clearly a problem more widespread and larger than people looking at videos and pictures. Even if we were to imagine that we wiped out every single cache available online, it ignores that one of the most vulnerable segments of our population is still being exploited. The lopsided nature of policies targeting people that consume the media vs people who actually engage in abuse belies this.
.......

http://news.cnet.com/8301-13578_3-9899151-38.html

>by PzkwVIb March 21, 2008 4:55 AM PDT

>If people are abusing children and producing child porn, then go after them. [...]downloading such material does not harm a hair on a child's head. [...]Making possession, which on the net can even mean hidden thumbnails on web pages, is just plain Stupid.
[...]

>but as a law enforcement official or a politician you get the same boost in popularity if you go after the easier to catch people than the ones actually harming children.

"The love between men and boys is at the foundation of homosexuality. For the gay community to imply that boy-love is not homosexual love is ridiculous." - "No Place for Homo-Homophobia.", San Francisco Sentinel, March 26, 1992

"Shame on us if our lesbian/gay voices remain silent while our
NAMBLA brothers are persecuted once again, and shame on those
lesbians and gay men who will raise their voices to condemn NAMBLA,
insisting that boy lovers (and presumably the boys they love and who
love them) are not part of this thing called the lesbian/gay
community."
- Steve Hanson, "Shame on Us.", Bay Area Reporter, January 23, 1992

"NAMBLA is by no means on the fringe of the "gay rights" movement. For years, it was a member in good standing of the International Lesbian and Gay Association (ILGA), and was only jettisoned by ILGA when the parent organization applied for United Nations consultative status in 1993. Years earlier, the ILGA itself had resolved that "Young people have the right to sexual and social self-determination and that age of consent laws often operate to oppress and not to protect." "
- http://www.lifeissues.net/writers/clo/clo_09homosexuality.html

While I agree with most of what you wrote, a little more sensitivity (and affording the benefit of the doubt to; assuming good faith) to the poster you are replying-to is in order.

"By the way, how is it that you've spent enough time on pedo sites to have discovered a video of yourself?"

Logic fail.

Spending any considerable length of time at the sites in question is not necessary in order for the claim in question to be plausible.

(Besides which, I don't agree that merely *viewing* *anything* should, in and of itself, be considered a crime.)

The "love" being referred-to in the above quotes is little more than an Orwellian euphemism for the buggering and sodomizing of tender youth by adult males.

(This is particularly disturbing when one considers the distinct physical as well as psychological disadvantage that the *receptive* partner in anal penetration is placed at: The bulk of the considerable risk of deadly infection as well as injury, ALL of the pain, discomfort and inconvenience that are endemic to this act, etc. )

Do You really believe 911 was terrorist attack??? Your government is the biggest gang of amoral criminal feeding lie and destruction around the world. Are you insane: i want all adv sites are deleted, censored sites - deleted etc means I want to decide what to delete - "many others feel the same way" and we are from nsa/cia/fbi/etc.com.

Anonymous

June 10, 2013

Permalink

i just found out about this and i am interested in helping. i dont have money but i do have loads of free time and the ability to learn. i am not a developer but i am seriously considering trying to become one. i will look into the stuff here and try to figure out what i can do. many thanks TOR project. y'all are great :-)

Anonymous

June 10, 2013

Permalink

Let me understand, Tor uses 1024 RSA keys and NSA could pobabily have quantum computing device in her hands and you do think Tor is still reasonably secure? Why?

"NSA could pobabily have quantum computing device in her hands"

"her hands"?

How many women work for the NSA?

Sounds like political correctness run amok.

Anonymous

June 10, 2013

Permalink

I think it's the time to considered the new protocol. The internet is borne thanks to the US military network, and that's made the government and agents easily to pry on them. I think we should make the TAN (The Alter Network) that can be rival the existence of the internet it self. Simply by using the existence of TOR hidden service as an example, add with either geo or satelitte connection to increase the bandwith. Let the government rule the net while the civilian made their own un-regulated aka rebel network. Serverless and portability is the key here. But of course the problem is how to get the new internet alternative can be work. First we shall needed the the energy source, second we shall needed fully double or triple encryption this one modelled after freenet and garlic I2p layer and finally hopping and jumper like tor it self.
Yes it's too big if only one or 2 but if all the people who loves the freedom joint hand in hand together then we shall made it. For the energy resources I work the hardest, but should this power resources available where can I send the plan for free for all of you? I'll do this because of the freedom to express our thought is above of all. I come from Indonesia the pseudo democratic nation who actually be the one who shall oppress any of freedom of thought

Anonymous

June 11, 2013

Permalink

Hello. Here is how NSA most probably works (one of the ways, as they use multiple ways to get the deciphered data. It does not hack the https, but it accesses the data after it has been decrypted from https, at the Server side. (meaning they get the IP and the name).

Can you comment how Tor could do against this way?
the link in german, but google translates it very good:http://fm4.orf.at/stories/1719346/

thnx.

Anonymous

June 11, 2013

Permalink

There was a breach a good while ago in secrecy in San Francisco when a technician blew the whistle on a "secret room" at AT&T that intercepted all electronic traffic (IIRC). It's not clear whether the honchos knew or not. It wouldn't be necessary.

Anonymous

June 11, 2013

Permalink

Brief comment regarding the donation issue (donator wanting to contribute to a small sub-developed part of Tor)...perhaps a solution would be to contact the Software Freedom Conservancy to see about incorporating these small parts of Tor into their umbrella framework? They do awesome work for many Free Software projects and to my mind it'd be worth a discussion if nothing else.

Cheers.

Anonymous

June 12, 2013

Permalink

Why nobody is asking how many TOR nodes are set up by NSA and by its cover companies? NSA-TOR-nodes could be even visible via cable modems, ADSL lines etc. If there are 10000 Tor nodes online and 9500 of them are set up by NSA what would it mean? Also EFF interactive graphics only recognizes case where NSA is out-side of TOR. What if they have captured the TOR? Would somebody more familiar with TOR comment this?

May I ask how you plan on doing such "actual searching" without getting yourself flagged as suspicious in the process?

Rely on Tor?

How will you even know that whatever info you find won't have been manipulated and altered by potentially NSA-run exit nodes?

If you've found some way of achieving reasonably reliable, trustworthy end-to-end encryption for all of the sites you may visit, please share it with us!

Because the number of sites that support HTTPS-TLS is still a distinct minority (as problematic as the whole CA- thing is in the first place.)