September 18th, 2024

Is Tor still safe to use?

The Tor Project reassures users that the Tor Browser is secure despite a de-anonymization incident linked to outdated software. They emphasize the need for software updates and network improvements.

Read original articleLink Icon
ConcernSkepticismCuriosity
Is Tor still safe to use?

The Tor Project has addressed concerns regarding the safety of using Tor following an investigative report about a de-anonymization incident involving an old version of the Ricochet application. The report indicated that a targeted law enforcement attack successfully de-anonymized a user due to the use of outdated software lacking modern protective features. However, the Tor Project reassures users that the Tor Browser remains secure for accessing the web anonymously. They emphasize the importance of keeping software updated to benefit from the latest security enhancements. The project is seeking more information about the incident to better understand the attack and improve user protection. They note that the Tor network is healthy, with an increase in exit nodes and ongoing efforts to enhance network diversity and security. The Tor Project encourages users to contribute to the network's growth and diversity to minimize potential surveillance risks. Overall, while the incident raises questions, the Tor Project maintains that Tor is still a reliable tool for privacy-conscious users.

- The Tor Browser is still safe for secure and anonymous web access.

- Users are advised to keep their software updated to protect against vulnerabilities.

- The de-anonymization incident involved an outdated version of the Ricochet application.

- The Tor network has seen an increase in exit nodes and improved bandwidth.

- The Tor Project is actively seeking more information to enhance user protection.

AI: What people are saying
The discussion surrounding the security of the Tor Browser reveals a range of opinions and concerns among users.
  • Many commenters express skepticism about Tor's safety, particularly regarding potential government surveillance and de-anonymization risks.
  • Several users highlight the importance of maintaining updated software to mitigate vulnerabilities, referencing past incidents of de-anonymization.
  • There is a debate about the effectiveness of Tor against state actors, with some arguing that it may be safe for certain users while risky for others.
  • Some comments reference historical talks and reports that discuss the risks associated with using Tor, emphasizing the need for awareness of operational security (OpsSec).
  • Overall, the conversation reflects a mix of caution and advocacy for privacy tools, with varying perspectives on the implications of using Tor.
Link Icon 55 comments
By @alasdair_ - 5 months
Here is what I don't understand: Let's say I as a private individual fund 1000 tor nodes (guard and exit nodes included) and have them all log everything. This could cost less than $5000 for a month, with some time needed to get guard node status.

I want to find a certain kind of person so I look for people that access a specific hidden service or clearnet url.

Surely eventually I'm going to get a hit where all three nodes in the circuit are my nodes that are logging everything? It will take a long time, and I can't target a specific person, but eventually I can find someone who has all three bounces through tor nodes I control, no?

By @roetlich - 5 months
For context, here's the NDR report: https://www.ndr.de/fernsehen/sendungen/panorama/aktuell/Inve...

And more info here: https://lists.torproject.org/pipermail/tor-relays/2024-Septe...

Edit: The NDR alleges a timing attack (no further explanation) that allows "to identify so-called ‘entry servers’" Very little information is actually available on the nature of the attack. The NDR claims this method has already lead to an arrest.

By @flufluflufluffy - 5 months
As knowledgeable users of the Internet in 2024, we would do well to assume that nothing is 100% “safe” (I.e. there’s no such thing as perfect security/privacy).

However, some things, like Tor, can make your use of the Internet safer.

If all you’re doing is arguing that Tor shouldn’t be used because it isn’t/was never “safe”, then you might as well not use the Internet at all.

By @haolez - 5 months
Here is an awesome DefCon talk about this topic from the perspective of a darknet vendor. It's amazing:

https://youtu.be/01oeaBb85Xc

By @burningChrome - 5 months
I remember Adrian Crenshaw doing a speech at Def Con 22 about how people got busted using Tor. Even then he point out in most of the cases, it was bad OpsSec by the person, and had nothing to do with Tor.

How applicable do people think this information is now 9-10 years later?

DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught https://www.youtube.com/watch?v=eQ2OZKitRwc

By @oytis - 5 months
Don't quite get it - why doesn't CCC share information with the Tor Project maintainers?
By @valianteffort - 5 months
Federal agencies operate enough exit nodes to make Tor use risky at best. I have no idea if they have since implemented some feature to prevent this but if not I would stay far away from Tor if you're planning to do illegal things. There's also the risk of trusting service operators to secure any PII you expose on marketplaces.

Not that I think the Fed's would blow their cover to hunt down people buying drugs but still seems stupid to trust.

By @hannasm - 5 months
If enough governmental bodies can get behind running Tor nodes then couldn't we theoretically protect the bulk of humanity from spying on Internet access? Truly an advance in the Internet technology. It's kind of like if a single nation does it they control everything, but once all the nations compete then everyone wins.

But at planetary scale would Tor scale in an environmentally friendly way?

By @yieldcrv - 5 months
This isn't written in the most confidence inspiring way

But the things that do inspire confidence:

Tor is updated against vulnerabilities pre-emptively, years before the vulnerability is known to be leveraged

Tor Project happens to be investigating the attack vector of the specific tor client, which is years outdated

They should have just said “we fixed that vulnerability in 2022”

with a separate article about the old software

By @lifeisstillgood - 5 months
I am interested in the “legitimate” uses for tor. I have not kept up with this but I understand it was designed by US Navy to make it hard for oppressive regiemes to track their citizens use of web.

What do we want Tor for except as a hope that Russian citizens might be able to get to the BBC site?

I am asking honestly - and would prefer not to be told my own government is on the verge of a mass pogrum so we had better take precautions.

By @zoobab - 5 months
TOR critics like Len Sassaman said the same years ago, with traffic analysis it is possible to detect where the source is coming from.

https://en.wikipedia.org/wiki/Len_Sassaman

By @MR4D - 5 months
I’m a tor novice, so please excuse the simplistic question…

Couldn’t a national security organization just modify a node to route traffic to other nodes it controls instead of uncontrolled nodes?

By @ObsidianBreaks - 5 months
I think it's prudent to point out that the article's title is quite 'clickbaity', but to address it directly, the correct answer is (as it usually is) is 'it depends'. In my view, it depends on the answer to the question 'safe for who?', i.e. what is the threat model to which you are trying to guard against? If it's the US, then of course not, as the code is well-known to the US and I would expect that they have known vulnerabilities that they can leverage to ascertain the users of their service. The fact that TOR is, 'on paper', non-governmental doesn't really matter these days with the merging of private and public (and non-affiliated open-source communities) inside the security community. I would say that even the fact that it's open source isn't much of guard against such attacks, given that it relies on proficient oversight (which many eyes may not guarantee). Against other 'nation state' type adversaries - I'd wager that the more prominent who have the capacity to host a large number of relay nodes, and have access to very large computational power, will find it possible to decode portions of the TOR traffic. Against less technically proficient adversaries, such as 'run of the mill' police forces and minor nation states I'd go so far as to say it might be secure but only if you are using it for something uninteresting to them, but I ask 'how hard is it really to do a man in the middle a TOR relay?', and in terms of the most general case, 'what about the endpoints?' which of course aren't secured via TOR. Ultimately the best defense against 'snooping' in my view is to use a pre-agreed communication protocol which is undocumented and is known only between the communicators and is unusual enough to be hard to recognize or hard to work out what it means (preferably with a key to those communications known only to the two parties), but then I suppose you could use any communication protocol...
By @puppycodes - 5 months
The question is always and forever who are you hiding from and how strong is their will?

Assume if the will is strong and the resources are strong you will be eventually identified. If your not worth it then your not worth it.

become not worth it

By @spit2wind - 5 months
A great history of Tor was recently published (with open access). Super interesting read.

https://direct.mit.edu/books/oa-monograph/5761/TorFrom-the-D...

By @cypherpunks01 - 5 months
Remember the Harvard student that emailed in a bomb threat via Tor to get out of a final exam in 2013?

He got caught not by the FBI breaking Tor, but just by network analysis of university network traffic logs showing a very narrow list of on-campus people using Tor at the time the threat was communicated. He quickly confessed when interviewed.

https://www.washingtonpost.com/blogs/the-switch/files/2013/1...

Just another factor to consider when using Tor - who's network you're on.

By @o999 - 5 months
Old Ricochet used onion v2, that has stopped working long ago as far as I know, or I am missing something
By @ementally - 5 months
https://spec.torproject.org/vanguards-spec/index.html

>A guard discovery attack allows attackers to determine the guard relay of a Tor client. The hidden service protocol provides an attack vector for a guard discovery attack since anyone can force an HS to construct a 3-hop circuit to a relay, and repeat this process until one of the adversary's middle relays eventually ends up chosen in a circuit. These attacks are also possible to perform against clients, by causing an application to make repeated connections to multiple unique onion services.

By @notepad0x90 - 5 months
From what little I've heard, de-anonymization of Tor users is largely done by targeting their devices with zero-day exploits. That is still a valid method, I wouldn't trust Tor personally, but I'm with the Tor project that there is no credible evidence of a large scale de-anonymization attack.
By @vbezhenar - 5 months
Here's imaginary attack with adversary. Just push as much traffic as possible from many hosts to the given hidden service. Now observe traffic metadata from high level network operators. With enough filtering it should be possible to detect where traffic spike is terminated.
By @randymercury - 5 months
At the most basic level we're talking about a very public service that has been around for a long time that is a potential weakness/ enormous target for the best funded and most technically proficient intelligence agencies in the world.
By @ggm - 5 months
Absolutist statements about services like TOR or VPNs are often not helpful. It's highly contextual to the threat. If the threat is a state actor it's likely nothing, TOR included, can preclude them from determining things about you that you would prefer them not to know.

Some specific state actors operate TOR entry and exit routers and can perform analysis which is different to others who just have access to the infra beneath TOR and can infer things from traffic analysis somewhat differently.

I have never been in a situation where my life and liberty depended on a decision about a mechanism like TOR. I can believe it is contextually safe for some people and also believe it's a giant red flag to a lead pipe and locked room for others.

By @ocean_moist - 5 months
If your threat model includes western nation states, there are much bigger threats to your opsec than Tor. If your threat model does not include western nation states, Tor is safe to use.
By @nixosbestos - 5 months
Is it possible to "break" the protocol in such a way that Hidden Services cannot be used without some version of vanguards? It almost seems worth doing?
By @rolph - 5 months
https://github.com/blueprint-freespeech/ricochet-refresh

...We are writing this blog post in response to an investigative news story looking into the de-anonymization of an Onion Service used by a Tor user using an old version of the long-retired application Ricochet by way of a targeted law-enforcement attack.

...From the limited information The Tor Project has, we believe that one user of the long-retired application Ricochet was fully de-anonymized through a guard discovery attack. This was possible, at the time, because the user was using a version of the software that neither had Vanguards-lite, nor the vanguards addon, which were introduced to protect users from this type of attack. This protection exists in Ricochet-Refresh, a maintained fork of the long-retired project Ricochet, since version 3.0.12 released in June of 2022.

By @arminiusreturns - 5 months
I doubt it, it's too vulnerable to relay or 50% style attacks. I stopped using it in 2011/12-ish.
By @tomcam - 5 months
Sincere question. This was created with US government funding. Is there any reason to believe it is safe?
By @gigatexal - 5 months
Was it ever safe? Wasnt it created by the AirForce or something? I’ve always thought of it as a honeypot.
By @loup-vaillant - 5 months
By @taneq - 5 months
"Safe" doesn't have a meaning until you define your threat model.
By @grayxu - 5 months
A safer approach is to treat Tor only as a special obfuscation method.
By @GaggiX - 5 months
It depends, are you dealing with Mossad or not Mossad?
By @smileson2 - 5 months
Depends on your risk, if are are trying to avoid censorship and political repression in say Iran or china you are probably fine

If you are an enemy of the United States you probably aren’t but that’s a high bar

By @archsurface - 5 months
The more privacy the better as far as I'm concerned, but I've never used tor. What are people using tor for? General comms, piracy (mild illegal), other (very illegal), ...?
By @nickphx - 5 months
not when you consider the level of monitoring at critical internet exchange points..
By @moogly - 5 months
Representing the letters "nsa" in "unsafe" since 2006.
By @2d8a875f-39a2-4 - 5 months
Was Tor ever safe to use? I don't think so.
By @argentier - 5 months
safe as it ever was
By @smm11 - 5 months
Still?
By @drumttocs8 - 5 months
Agencies operate untold nodes.

No.

By @jstanley - 5 months
The best attack against Tor is convincing people not to use it.

If anyone tries to convince you Tor is not safe, ask yourself: cui bono?

By @deviantbit - 5 months
No. It is not. More than 1/3 of the Tor servers are run by US Federal Govt as does other members of the Five Eyes. Israel has a large number as well. Cases are built backwards or in parallel that are from the fruit of the poisonous tree. If you don't know what that term means, look it up.

Use Tor with extreme caution.

By @DonnyV - 5 months
Tor has never been safe to use.
By @2OEH8eoCRo0 - 5 months
It's safe if you ain't a pedo or terrorist.

Sometimes I wonder wtf y'all are doing with such crazy security expectations and paranoia.