![]() |
![]() |
#1 |
Aug 2003
Snicker, AL
7×137 Posts |
![]()
I've looked at it for a while and see at least one vulnerability. It requires access to data on a breathtaking scale, but if available, Tor can be de-anonymized. Thoughts?
|
![]() |
![]() |
![]() |
#2 | |
∂2ω=0
Sep 2002
República de California
1158610 Posts |
![]()
I expect much depends on how the user accesses Tor - the getting into" step is probably the juiciest target for a would-be de-anonymizer. For example, Facebook just recently announced that they had added support for users to use FB via Tor - but unless I'm gravely mistaken this requires a login credential of some kind, which the feds could force FB to divulge.
There are surely other potential vulnerabilities, but those related to real-name-associated-signins, especially with 'social' sites which engage in prolific credential-sharing (including with third parties, such as advertisers and 'other enities') seems a very glaring one to me. Remember, if you're doing anything online, you're basically playing the privacy game on the cyberspooks' and hackers' turf, and many of the rules of the game (e.g. whose data feeds they directly tap into, and who they have 'approached' about coughing up user data) will only be known to them, not you. My take is: If you're doing it online, assume it's not private. Even the theoretically safest crypto protocols are subject to real-world software implementation, and that's usually where "the rub" lies. There's simply too much stuff "you have to take someone's word for" even with respect to the most basic online tasks to ever be truly sure some waypoint hasn't been compromised by "the listeners". Related: Some interesting stuff on Ars Technica re. the takedown of Silk Road 2.0: Quote:
|
|
![]() |
![]() |
![]() |
#3 |
Dec 2012
The Netherlands
110001100012 Posts |
![]()
The Tor project team have always welcomed serious research into the service. I remember Roger Dingledine several years ago begging everyone at a conference to study all aspects of the system and let him know what they thought! These days, they also have Casper Bowden on board among lots of other good people:
https://www.torproject.org/about/corepeople.html.en Anyone interested in learning about Tor or contributing at this level (rather than just using the service) should start by reading the relevant papers from past years of the PET symposium: https://petsymposium.org/2015/links.php |
![]() |
![]() |
![]() |
#4 |
Bamboozled!
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across
17×619 Posts |
![]()
This might also be interesting if you wish to dive in at the deep end.
https://lists.torproject.org/piperma...er/007731.html Paul Last fiddled with by xilman on 2014-11-09 at 17:28 Reason: Remove spurious line break in URL |
![]() |
![]() |
![]() |
#5 | |
Basketry That Evening!
"Bunslow the Bold"
Jun 2011
40<A<43 -89<O<-88
722110 Posts |
![]() Quote:
I ran an exit relay for a month or so on my residential connection (I have what is perhaps the best ISP in the US of A, see attachment), but eventually had to give it up as it often interfered with me and my roommate's normal browsing. (Among other things, one cannot edit Wikipedia from an exit relay, and Hulu and Skype *still* block this IP address despite not having had any relay of any sort in a couple of months. Actually, while writing this post I just tried Skype again and it seems to work now. I guess the call I made three weeks ago finally made it through their system.) |
|
![]() |
![]() |
![]() |
#6 | ||
∂2ω=0
Sep 2002
República de California
2×3×1,931 Posts |
![]()
Darknet Sweep Casts Doubt on Tor | Counterpunch.org
Quote:
Berlin’s digital exiles: where tech activists go to escape the NSA Quote:
|
||
![]() |
![]() |
![]() |
#7 |
Romulan Interpreter
Jun 2011
Thailand
9,161 Posts |
![]()
People here speak yodish can not.
(re: changing of the topic title) |
![]() |
![]() |
![]() |
#8 | |
"Kieren"
Jul 2011
In My Own Galaxy!
11·13·71 Posts |
![]() Quote:
I am wondering if it perhaps should be defenestrated. It seems that in the current situation, Tor only provides a false sense of security. Not that it matters to me, as I've never used that sort of service. EDIT: I generally take the attitude that if snoops want any bit of my data and communications, they will take it.....as if they probably haven't already. The only question is whether one's particular stream of data becomes interesting enough to examine, out of the torrents which are captured. Last fiddled with by kladner on 2014-11-13 at 02:20 |
|
![]() |
![]() |
![]() |
#9 |
Aug 2003
Snicker, AL
16778 Posts |
![]()
"an" is a greek word meaning "not". So "anonymous" = not known, "onymous" = known. It is a play on words that I picked up from a an Isaac Asimov short story, Anniversary, which was about a device called "anopticon" as in "not' based on optics.
Re TOR being "onymized", all evidence so far is that they have to get through to the far end server and there has to be a vulnerability on that server that can be exploited. There is also some fud going around that they "social engineered" access to silk road 2. This leads me to suspect that both vulnerability and social engineering are red herrings intended to distract from the real method they are using to get into hidden portals. |
![]() |
![]() |
![]() |
#10 | |
∂2ω=0
Sep 2002
República de California
2·3·1,931 Posts |
![]() Quote:
|
|
![]() |
![]() |
![]() |
#11 |
Romulan Interpreter
Jun 2011
Thailand
9,161 Posts |
![]() |
![]() |
![]() |