ManBearPig
Diamond Member
deleted
Last edited:
It would foolish to assume that the NSA doesn't have a ton of tor nodes and exit nodes in place to figure out where traffic is coming from. It wouldn't take long to ascertain who is who if you have enough nodes in the network.
It would foolish to assume that the NSA doesn't have a ton of tor nodes and exit nodes in place to figure out where traffic is coming from. It wouldn't take long to ascertain who is who if you have enough nodes in the network.
Enough nodes is the operative phrase. The way to combat subversion of the system is by participating in the system. Setting up as a relay is easy, and it also helps hide your own traffic amongst the noise.
It was neat seeing it work but not that useful for me since it seemed many sites tried to block the exit nodes.
Figuring out the traffic flow from one node to another is one thing, having any clue what is in it and where the ultimate end point is another. While nothing is perfectly secure, the logic behind the onion routing makes it very difficult to pin traffic on any specific person. Is the traffic coming from node A for node A (as in to exit to a user browser) or is it passing though traffic for node b,c,d,e,f,g,h,i,j,k at the same time?
Considering they still haven't found freedomhosting (it has been in the news for hosting drug sites and other stuff) and that has been running for years, I would place a 1/2 decent bet that sending a secure journalist email in a repressive government is "fairly safe."
The NSA does not care about taking down freedomhosting or any underweb hosts/sites. In fact, if they knew its location the gov would not shut it down as they could then swarm it with their own nodes in order to piece together its traffic. If they shut it down another one would pop up someplace else and they'd have to start all over.
It would be much easier than you think to determine where the nodes are if you have 1,000 or more "custom" nodes routing traffic in a certain manner, and distributed in such a manner, that patterns become obvious rather quickly.
You've been warned. 😉
Uh huh. Where is support and documentation for these claims? Ambiguous "you have been warned" doesn't mean anything.
These "claims" are just the result of understanding how tor works. The limitations in tor anonymity are well documented and discussed. Google should find any info you require.
Instead of looking there first, I recommend you do a bit more reading on, and get a better understanding of how the tor network operates. When you understand it, my above "claims" will appear rather obvious.
I'll try to give an example: If there are 1,000 tor nodes, 1 is a computer geek wanting to explore the tor network, and 999 are NSA nodes, how easy would it be to find this 1 person? The onion only adds 1 layer per node, and traffic generally goes through 3 - 5 nodes before reaching its destination (an onion resource or an exit node). In this example the computer geeks traffic will be hitting an NSA node 100% of the time for 100% of his routing. As each NSA node is aware of the IP's of all other NSA nodes, the computer geek sticks out like a sore thumb, and his traffic, source and destination, can be monitored very easily. If there are 10,000 geeks using tor at any one time, how many NSA nodes are required to be in the mix in order to have a high (> 90%) success rate at tracking any one nodes source traffic from the source to its destination? 1,000? 5,000? 20,000? Whatever number of nodes is required, the cost would be a drop in the bucket compared to the NSA budget for such monitoring activities (billions), e.g. their million sq ft data center going up in Utah, so it would be foolish to assume they wouldn't.
I'm getting 3485 active nodes from around the world. It's unreasonable to assume the NSA is controlling a majority of them.
a request coming from my node could be originating on another node "1001" so there is no actual proof the connection even came from me.
Yes, but if they are monitoring traffic to specific websites/services/ip's via control of exit nodes, and they notice over a period of time that traffic to those sites always appears to originate from your node, it becomes obvious very quickly that your node is the originating node. The odds that somebody else is routing through your node every time are basically nill.
Your unrealistic case hinges on my node being 100% contained inside an NSA network.
Not true. I made your node 100% contained in my example to explain how it would work, but it certainly doesn't hinge on that. With enough nodes and enough time (and enough traffic from you) "they" can narrow down traffic between nodes to you.
This weak point in the anonymity of Tor traffic is well known. No point in arguing it.