Strong doubt on the safety of the TOR network


last year
Hello all.

according to this graph:

https://metrics.torproject.org/network.html#relayflags

there are roughly 6000 tor nodes (relay+exit combined) up and running.


As soon as an attacker controls all 3 nodes randomly selected for the tor route ( entry -> relay -> exit ), the anonymization process is in vain.

So, let's say the NSA rents 6000 servers, hence they now control 50% of the tor network and have a high chance on breaking many communications.
let's say an average server costs them 50$ a month, that would be 300K USD per month, which doesn't seem too much money for the biggest intelligence service.

Of course it would be pretty obvious to just double the amount of tor nodes within like a month, but let's say have been doing this gradually for a couple of years now, and control 50% of the 6000 nodes RIGHT NOW.

last year
Then my questions are really eligible !
http://torforum.org/viewtopic.php?f=4&t=65421

Why are tor nodes not used that could be available?

So, let's say the NSA rents 6000 servers, hence they now control 50% of the tor network and have a high chance on breaking many communications.
let's say an average server costs them 50$ a month, that would be 300K USD per month, which doesn't seem too much money for the biggest intelligence service.
"justwondering"

Beside this are shared costs, because this server's can be used for other sniffing and scanning purposes too!

last year
http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity

The NSA creates "fingerprints" that detect http requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool which NSA boasts allows its analysts to see "almost everything" a target does on the internet.


After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user's computer.


Additionally the Tor nodes driven by the NSA can use modified software for this.

[u]Then i found this article:[/u]

http://pando.com/2014/07/16/tor-spooks/

But the German exposé showed Tor providing the opposite of anonymity: it singled out users for total NSA surveillance, potentially sucking up and recording everything they did online.


When this is true Tor is simply a tool for the NSA and not the hope of privacy for the users.

Reply

You are not logged in. Login or register to reply on this thread.