Let's talk about Tor.
13 2015-04-02 by hello_bluffdale
Is Tor safe? Is it secure? Is it useful?
There's a lot of talk about the police state here. The panopticon. All-seing eyes and shit. Anonymity defies this state. Do you think Tor is any of the above?
27 comments
6 abdullah_boogers 2015-04-02
cryptome.org/2013/12/Full-Disclosure.pdf notice the part about dod/gchq tor honey pot.
First thing anyone should do is get an openwrt comptable router and encrypt your dns. Also stahp using windows and macosx.
They can see that your using tor instantly, they can measure request times to fractions of a milisecond and measure bandwidth. They can fingerprint your browser. White hat anonymity is dead imo. You can encrypt your dns with dnscrypt-proxy and use other means to deny them metadata and vpn through some of the mass dragnets. They are the gatekeepers and even a simple request to reddits servers passes through many of these gates. Its not about whether encryption works. It's about traffic anlysis imo.
really want anonymity use tor with tails from outside a starbucks I guess. That is assuming that tails devs are not a pit of vipers. At which point maybe just throw the whole machine away after using it with the camera and mic ripped out of it...
5 hello_bluffdale 2015-04-02
Thoroughly sound advice. Especially about the router -- Hacking routers is way cheaper (in terms of risk of exposure) than hacking PCs. Get that backdoored shitty firmware off your routers people. And stahping with the closed-source OSes is good too. Though those aren't backdoored as cheaply and as all the time as routers. But still, even your hacked router can't peer into a secure conection, and they can't peer into Tor. They sure can collect timing and bandwidth data though, which brings us to your next point -
Can they? It's certainly not by measuring bandwidth and latency. I'm a web developer, so I know my way around web browsers. The default Tor browser goes a long way to defingerprint its requests.
Beyond that, interrogative fingerprinting (with Javascript for example), is only possible when someone's interfering with the connection to inject data.
This is trivial and undetectable to do for an unencrypted connection (http) but very expensive for well-encrypted connections (https with a good cipher suite choice). I say "expensive" rather than "impossible" because servers can be compromised directly, and then work to deanonymize their users. This is not something Tor can help with, but Tor can probably be used to deanonymize Hidden Services. This can be done with Denial of Service attacks that are visible to the public -- that is, it's hard to do it covertly, and it's hard to do it without being noticed. Besides, Tor provides connection anonymity, it makes no guarantees that you should trust the server.
What they can fingerprint -- or more accurately, footprint -- is your browsing history. That's why I advise not mixing regular browsing with your Tor activities that are unique to you. Sometimes I search for things I'd never care about on Tor just to mess with their history analyzers.
Another thing: currently, Tor connections are dinstinguishable from TLS (https) connections, but this is basically a bug, and is going to be fixed in future versions. You will be able to run Tor over https, and it will look indistinguishable from an encrypted web browsing session. This is because encrypted data is opaque, but there's a slight difference in the way Tor initiates its encryption. That's what gives it away.
3 abdullah_boogers 2015-04-02
The browser bundle does a great job yes. Tor as a service using your own browser not so much. https://panopticlick.eff.org/
I also forgot about staining. http://cryptome.org/2013/10/packet-stain/packet-staining.htm
6 hello_bluffdale 2015-04-02
Ah, yes. It's important for security to use an adblocker. It's more than just removing ads.
These things demonstrate to me that the NSA doesn't have a backdoor to Tor specifically, unlike some out there (Yasha Levine, Pearse Redmond, etc.) believe. They're having to work around the security of the Tor network itself, because it appears to provide what it promises -- connection anonymity. And all you need to do to thwart traffic analysis attacks is to run Tor with cover traffic, most helpfully by being a relay.
4 theM3chanic 2015-04-02
all very good points and very good advice.
the only thing i would always recommend if you really want anonymity is a cheap laptop bought used at some flea market,dban it,then rip the harddrive,cam,mic out and run TAILS or Whonix through it and use that to use TOR
ultimately my only problem with using TOR and suggesting it to normal users is,that just using TOR alone gets your traffic watched more,so don't do it from home unless you take many measures of precaution
also let's remember that if TOR relies on not being able to see all the nodes,and sadly if they do have the capability that is rumored,that means they might be able to see all the nodes
all in all they won't use this approach much against just someone browsing,this is more used against a node itself that's hosting something
any of you care to comment on if it's true they can break asymmetrical encryption?
1 hello_bluffdale 2015-04-02
I do wonder how much one can do even by seeing the whole network, as all internal links are encrypted and have some amount of cover traffic for any given connection. Still, Tor is a low-latency network, which means it does not take active measures to combat traffic pattern analysis. This is why I recommend cover traffic (downloading some youtube video, porn, etc) while doing something you want to remain anonymous. It might be helpful, and I don't think it hurts...
Given how badly they want the keys, I'd say most asymmetrical encryption is safe. That is, they might be able to shave a few bits off of a brute force attack, but they can't outright break RSA or Elliptic Curve crypto. There are probably some weak curves in the NIST standard though, and some bad RSA initialization parameters. Also, they probably knew about things like Heartbleed, so it's still very important for content providers to stay up-to-date on security bulletins.
But I'm pretty sure the math is sound.
1 theM3chanic 2015-04-02
The only slight problem i see with it all,is they usually have their hands in getting these standards put out there they are usually actively involved in being architects for crypto standards
i'd like to pose yet another question, any opinions on "The Equation Group?"
2 hello_bluffdale 2015-04-02
It's a good idea to move away from NIST standards. I myself like the stuff Daniel Bernstein's been working on: thinks like the 25519 Elliptic Curve. He and other crypto-minded folks (like Bruce Schneier) really don't trust the NIST standards these days, because many of them do not fully elaborate on the method of picking constants. (all crypto schemes have built-in constants, some make the crypto breakable, others make it secure. This is especially true with elliptic curves.)
They've been weakening them lately, but let's remember that the NSA has also secretly strengthened security before. Back when they were equal parts SIGINT and COMSEC, back in the cold war days. Check out the history of the DES cipher. They strengthened it against differential cryptanalysis without explaining, but they also promoted a weakened key size that made it crackable for them. It's pretty weird shit.
It's the work of the NSA's Tailored Access Ops. It's damned clever, but if you're not using Windows, there are ways to mitigate it. If you drive is encrypted through software (dm-crypt or truecrypt) -- and if your boot partition is encrypted as well, and you checksum the bootloader to make sure it hasn't been modified before entering yor password, there's not much this Equation Group firmware hack can do. You could also boot from a read-only USB key, or if you're really paranoid, from a finished burned CD.
The most important thing to realize is that for every measure they take, we have countermeasures. The panopticon is fundamentally, mathematically, physically unsustainable.
1 theM3chanic 2015-04-02
nice chatting with someone about this as i don't find it often i find people in this subreddit that has as in depth a view as people in this thread seem to have,and i generally avoid linux subreddit and a few others because they tend to only lean towards "politically correct" or "socially accepted" things and i'm a fan of Bruce S. myself, i've been following this since the Room 641A era
i'm personally a fan of gentoo or debian with dmcrypt boots with my own entropy
1 hello_bluffdale 2015-04-02
Awesome. That's exactly why I posted this thread. A curious intersection of knowledge bases in a curious place.
1 abdullah_boogers 2015-04-02
My fear is that Snowden is a limited hangout whose soul purpose is to convince people that encryption still works. I say fear because it is over my head and thats all it is, a gut feeling. http://en.wikipedia.org/wiki/Shor%27s_algorithm
2 hello_bluffdale 2015-04-02
I studied quantum computing at a graduate level (I also studied cryptography, if you hadn't guessed). Fast implementations of Quantum Computing do indeed break a lot of currently used asymmetric crypto (RSA, Diffie -Hellman, most Elliptic Curves). Fortunately, quantum-computing-resistant asymmetric crypto has already been developed: there's SIDH ( https://en.wikipedia.org/wiki/Supersingular_Isogeny_Key_Exchange ) for example. There's a good rundown at https://en.wikipedia.org/wiki/Post-quantum_cryptography .
My worst-case reasonable scenario guess (assuming no alien technology, but assuming Moore's Law holds for quantum computers -- which is a very lofty assumption), the NSA has quantum computers that run as fast as the mainframes of the 50s. That might be usable to break some small-key-size encryption, but nothing serious (RSA>2048bits, Elliptic curves > 256 bits), and certainly not en masse.
As for Snowden being a limited hangout, i think this is only partly true. see my take on the situation if you're interested: https://www.reddit.com/r/conspiracy/comments/2l7wge/hi_james_corbett_of_corbettreport.com_here._ama/clt71ub?context=3
Basically, we're seeing a high-level "friendly" conflict between elites aligned with SIGINT and the ones banking on COMSEC + psyops, plus a bout for the power to blackmail.
1 abdullah_boogers 2015-04-02
Good to know that they will be fixing the "dinstinguishable from TLS (https) connections bit." That has always just seemed like a massive red flag where using it outwieghed any of "my" gains. I still have concerns though.
1 BlacklistedMartian 2015-04-02
If you dont use mac or windows, what do you use? Linux? If you use Linux, who wants to waste money on a new router and encrypt your DNS? Linux does not leak DNS....Its been like that for years.
2 hello_bluffdale 2015-04-02
It's not about DNS leaks here, it's about having a hostile machine on your network that all your data goes through. Routers are the most backdoored things out there. Read up on the link /r/abdullar_boogers posted: http://cryptome.org/2013/12/Full-Disclosure.pdf
You don't need to waste money. Chances are, your router can be flashed with open-source firmware at zero cost. Take a look at https://en.wikipedia.org/wiki/List_of_wireless_router_firmware_projects for a firmware that probably works for your router. The bonus is the open-source stuff is usually easier to use and more functional than the corporate stuff.
1 BlacklistedMartian 2015-04-02
Hmmm.. Because if your DNS shows, they cant possibly track you...(sarcasm). DNS leak = Caught
1 hello_bluffdale 2015-04-02
You misunderstood. It's important to prevent DNS leaks, but that's not the purpose of installing open-source firmware on your router. The purpose is to ensure you don't have a hostile machine on your network.
Both things are important. DNS Leak = caught, and hostile router = caught. Security these days means staying safe on multiple fronts. Secure OS, secure DNS, and secure router and some of the most important ones.
1 BlacklistedMartian 2015-04-02
This is also why you dont broadcast your SSID. Excluding a third party from connecting to your network is easier than going through the trouble of downloading firmware.
SSID. Mac Filters... There are many easy noob friendly ways that dont take a mean google search, combined with trial and error to get something to work.
1 hello_bluffdale 2015-04-02
You don't understand -- the NSA has complete, trivial access to your router if you don't run open-source firmware. Especially the shit Verizon, Time Warner, Cogent and the like bundle. They don't enter by hacking the wireless network, there are backdoors and hacks galore for default firmware in routers, because it's such an easy and low-security target.
I don't think you looked at it, so I advise you to at least skim through this document: http://cryptome.org/2013/12/Full-Disclosure.pdf
1 BlacklistedMartian 2015-04-02
I don't think you fully understand either. Stop the leak between your computer and your router, and there's no need to secure your router.
The router is just a tool to connect to the webz.
1 hello_bluffdale 2015-04-02
Talk about a late reply...
The router is more than "a tool to connect to the webz"
Access to a router means access to your LAN. Means each of your computers can be probed for available vulnerabilities and commanded directly. Means you must firewall and harden every machine on your network as though they are directly connected to the internet.
The router also observes all incoming and outgoing traffic, and can be used for traffic timing attacks on Tor and other anonymizing tools. So if your router is compromised, it's very easy to deanonymize you even if you use all other proper precautions.
So stay safe out there! Run open source router firmware!
1 abdullah_boogers 2015-04-02
If it is on the openwrt box any device that connects benefits from the encryption. I have a family with wireless devices. I am not afraid of the nsa mandrake, I just deny them my essence. POE
4 OnSpeakerCrab 2015-04-02
There are a few sides to this:
1) They can see everything, and anyone "important" that gets taken down is a message / threat.
2) They can see nothing, and it's all fear to make people police themselves.
3) They can see some things (through known means, e.g. datamining).
4) They can see some things (through unknown means, e.g. spying).
Personally, I'm apathetic. I just want to watch.
3 hello_bluffdale 2015-04-02
What if the act of watching makes you a target? Would you not wish to watch anonymously?
3 JamesColesPardon 2015-04-02
If the act if watching leads to one being a target at this point, one could possibly argue that the system is too far down a dark path and there's nothing anybody here can do to stop it, and then at that point, who cares?
At least, at that point I'd stop caring. But everybody's different, I suppose.
3 hello_bluffdale 2015-04-02
I think content consumers (clients) have their anonymity preserved through proper use of Tor. Content producers (servers), especially the popular ones -- Hidden Services -- are vulnerable to long-term deanonymization attacks.
The best way to use Tor is for specific types of browsing patters that you'd wish to exclude from your regular browsing. Definitely don't check your gmail while looking through things you want to stay anonymous for.
3 DachshundSiege 2015-04-02
Safe? No. Merely using it flags you for additional NSA surveillance.
Secure? Probably not. De-anonymizing Tor users is a major NSA priority.
Useful? Extremely. For one example, you can use Tor browser to bypass Reddit bans, up to shadow/IP bans. Ordinarily, when you're shadowbanned by IP, you can't create new identities on Reddit, because they'll automatically be added to your existing shadowban. With Tor browser, you can create all the new identities you want, and completely disregard tiny-dicked Reddit mods/admins and their power trips.
1 lollers_ 2015-04-02
Think I found the source of that news. Guardian artlice from 2013? Not sure you should take everything from them as gospel, but I also noticed a redditor asking help on behalf of a friend locatedin Iran who has hadhis TOR blocked, so that seems legit to me.
Even if it's true, so what? Pretty sure anybody with a criminal record would get extra attention, meaning any kind of traffic indicment. Who hasn't been indicted or knows someone who has? I've had TOR, and VPN for a while now, but I don't think the NSA care much about anyone outside of mexico, iran, russia or china?
1 treerat 2015-04-02
/r/tor
2 hello_bluffdale 2015-04-02
I'm more interested in the questions and insight /r/conspiracy has on this, but yes, there's /r/tor ...
1 abdullah_boogers 2015-04-02
This has been a great thread. Thank you. For anyone interested in encrypting their dns who is currently running Linux but cringe at the thought of setting up dnscrypt-proxy. This script will make that much easier. https://github.com/simonclausen/dnscrypt-autoinstall. Frank Dennis the creator of dnscrypt-proxy contributes to it!
Ubuntuesque will complain about dnsmasq already using port 53. Comment out dns=dnsmasq line in /etc/NetworkManager/NetworkManager.conf.
Least expensive router you can squeeze dnscypt-proxy on that I have found is http://www.amazon.com/TP-LINK-TL-WR841N-Wireless-Router-300Mpbs/dp/B001FWYGJS. You will have to install libsodium and dnscrypt-proxy but it will fit. http://wiki.openwrt.org/toh/tp-link/tl-wr841nd
Openwrt comunity is fantastic.
1 GirlNumber20 2015-04-02
I use Tor just to create white noise. I literally just skim Reddit, watch cat videos on YouTube, check Amazon for sales, read a few blogs, whatever. I like to think that my inconsequential use provides a distraction from people who really need cover, like political dissidents or journalists. If they're wasting time monitoring me, that's less time they can spend on someone who truly needs anonymity.
Plus, I like to think of it as civil disobedience.
2 hello_bluffdale 2015-04-02
That noise is indeed useful. It's useful for others, but it's also useful for you, since now if you suddenly want to use Tor for something you'd really want to do anonymously, you already have cover traffic so as to not single out your occasional Tor use.
Yep. Just keep in mind, you're providing cover for everyone that uses the system. That means the activists and the CIA spies, but also probably the NSA data exfiltrators, and the child porners, and organized crime botnets.
I mean, it's still totally worth it in my opinion, I just wanted to mention that you can't be selective about who you provide cover for. Strange as it may seem, it's either Anonymity for All (who want it), or No Anonymity at All.
1 GirlNumber20 2015-04-02
Thanks for confirming it might do some good, and thanks for your great tips in this thread. I'm still running Windows, so I think I might make some of the changes you listed above.
I don't have anything to hide. But when someone spies on me for no reason? There's just something in me that says OH HELL NO YOU WILL NOT. I want to make it difficult for them as a matter of principle.
1 asdflkjvas 2015-04-02
LOL
1 GirlNumber20 2015-04-02
Thanks for confirming it might do some good, and thanks for your great tips in this thread. I'm still running Windows, so I think I might make some of the changes you listed above.
I don't have anything to hide. But when someone spies on me for no reason? There's just something in me that says OH HELL NO YOU WILL NOT. I want to make it difficult for them as a matter of principle.
1 hello_bluffdale 2015-04-02
You misunderstood. It's important to prevent DNS leaks, but that's not the purpose of installing open-source firmware on your router. The purpose is to ensure you don't have a hostile machine on your network.
Both things are important. DNS Leak = caught, and hostile router = caught. Security these days means staying safe on multiple fronts. Secure OS, secure DNS, and secure router and some of the most important ones.