[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Should I warn against Tor?



Dear reader,

Iâm a Tor user.

My interest in anonymity awoke in response to the European
parliament passing the data retention directive in 2005.  I did (and
still do) not want my ISP to be able to spy on everything I do.
I maintain a German web site explaining how Internet communication
works, warning against data retention, and advertising anonymity via
Tor [1].  I thought that there is not much to lose when using Tor
(except for speed).

Now, Iâm about to include a big warning concerning Tor.  Maybe Iâm
driven by fear, uncertainty, and doubt.  But I doubt that.  Iâd like
to see this e-mail as a consensus check ;)

Iâm only talking about Tor users like me, living in a stable
democracy.  In my idealistic (or naive?) view, itâs nobodyâs
business to collect data about me as long as Iâm not a suspect of
crime.  If they do anyways, they violate my (perceived) rights,
privacy, and dignity.  Iâm using Tor as tool to fight that
violation.  (My reasoning does not apply to people under oppressive
regimes who use Tor as protection from their own government when
they coordinate and communicate and whose physical freedom and
well-being are at risk.)

Of course, since Torâs beginning the threat model has been excluding
global passive adversaries (which are able to observe both ends of
the torified communication) but I didnât consider that a real issue.
However, now I do.

Today, the GCHQ (GB) is running Tempora to spy on all transatlantic
data, including three days of full storage for deeper analysis.  The
NSA (US) is doing all kinds of spying with PRISM, including rumors
of tapping directly into the German Internet eXchange DE-CIX [2].
The DGSE (French foreign intelligence agency) is spying massively on
the French (so much for *foreign* intelligence).  The BND (German
foreign intelligence) is allowed to monitor up to 20% of
border-crossing Internet traffic; supposedly, they are looking at 5%
right now and investing heavily to increase that number [3].

In 2007 Murdoch and ZieliÅski [4] developed traffic analysis
techniques based on sampled data for parties monitoring Internet
eXchanges (IXes).  Apparently, the parties mentioned above have
capabilities that go far beyond the paperâs sampling technique.
Thus, Iâm assuming that global adversaries are spying on me.

As I said, initially I worried about my ISP under data retention and
considered Tor to be an excellent protection.  Of course, thatâs
only part of the story as Iâd like to restrict who is able to spy on
me as much as possible, whether my ISP, the ordinary criminal, or
our governmentsâs spies.  Frankly, I only started to think about the
last point after seeing the video âEnemies of the Stateâ of last
yearâs Chaos Communication Congress [5].  There, former NSA
officials complained that the NSA is beating US citizensâ
constitutional rights into the dust.  However, the existence of
rights for Non-Americans was not acknowledged, and I wondered how my
expectations should look like given that Iâm not protected by the US
constitution.

Now, Tor re-routes traffic on a world-wide basis.  I believe that
without special precautions (Iâm going to write a separate e-mail on
that), my communication with the entry node as well as the exitâs
with the real communication partner will flow through big pipes and
IXes, which are worth the investment of spying facilities; of
course, terrorism needs to be fought â
Thus, Tor does not anonymize; instead, it turns all my network
traffic over to adversaries.  Hopefully, Tor makes the adversariesâ
lives harder, and they need more compute power to spy on me.  Maybe
they find torified traffic more interesting and handle it with
higher priority.  In any case, I assume that torified traffic gets
analyzed.

In contrast, without Tor Iâm *not* certain that all my traffic gets
analyzed.  Part of my traffic does not need to flow through big
pipes and IXes but stays in local, untapped regions of the Internet.

Thus, my warning could read as follows:
1. If you are using Tor, you should assume that all your network
traffic gets stored, analyzed, and de-anonymized by intelligence
agencies.
2. If you do not use Tor, you should be aware that your ISP could
spy on all of your network traffic, while part of it (that part
passing tapped IXes) gets stored and analyzed by intelligence
agencies.

Of course, there still is more fun in using Tor.

Whatâs your take on the current situation?  Should the Tor FAQ
include a similar warning?

Best wishes
Jens


CBP Crash Islamist Nazi Salmonella Mudslide Illegal immigrants
Blowpipe Narco banners Afghanistan ASPIC FARC illuminati InfoSec
Terror

Footnotes:
[1]  http://www.informationelle-selbstbestimmung-im-internet.de/
[2]  http://www.h-online.com/news/item/PRISM-scandal-internet-exchange-points-as-targets-for-surveillance-1909989.html
[3]  http://www.spiegel.de/politik/deutschland/internet-ueberwachung-bnd-will-100-millionen-investieren-a-905938.html
[4]  http://www.freehaven.net/anonbib/#murdoch-pet2007
[5]  https://media.ccc.de/browse/congress/2012/29c3-5338-en-enemies_of_the_state_h264.html
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk