I've heard a lot of people on the left argue that Tor is likely backdoored because it was created by the U.S. Navy for spies to communicate and is still funded by the government. Yasha Levine has written a lot about this:
- https://surveillancevalley.com/blog/tor-files
- https://thebaffler.com/salvos/the-crypto-keepers-levine
He also appeared in TrueAnon episode 50 to talk about this.
On the other hand, a lot of people in the crypto and tech community disagree with this. They believe that Tor is not backdoored for one or both of the following reasons:
- Tor is open-source and has been audited.
- The U.S. Government would never do such a thing.
They also point to a leaked NSA presentation from 2007 that admits the NSA can't deanonymize Tor users.
What are your thoughts?
The encryption is probably not broken but the government can, and probably has:
The ability to detect tor traffic at the customer facing interface of an ISP, which would deanonymize tor traffic
The ability to buy thousands of tor nodes at under $100 a piece, including entry/exit nodes, and use aggregate data to determine the location and identity of webservers
The control of a lot of VPNs, which will log your usage of tor traffic
And don’t forget the cooperation of every american ISP and probably a bunch of other NATO ISPs too. Long story short, if the US gov ever has a reason to target you specifically, maybe just don’t use the internet anymore
We're never gonna hear from Brace again
But if you want to avoid giving them a reason to target you, tor is very useful.
deleted by creator
They can tell that a specific household is using tor, which makes it not anonymous, I said that it doesn't mean decryption. TOR traffic does not behave like SSL traffic.
I'm not referring to that, the whole point of security at the
transportation(edit meant network layer) layer is pretty much pointless when the ends are compromised, and it is very cheap to do so.If you're doing VPN to Proxy to TOR or whatever then TOR isn't what's providing you security, you're just using it to access TOR content.
deleted by creator
Yes a lot of things use TLS, HTTPS uses TLS and it's not TOR, TOR is unique in that it operates differently on the network layer than pretty much everything else on the Internet.
Nobody is using a packet capture as evidence. I can google "how to build a (insert whatever here)" or "how to commit an act of (insert whatever here)" and there would be no consequences/surveillance. Surveillance acts on suspicious activity, not on content, and the TOR network is a lot more suspicious. Nobody I know uses tor for lots of different reasons, just drugs.
General trends in traffic. They can determine the location of webservers by general direction of traffic, even if individually the traffic is moving around a network like a ping pong ball.
If you want encryption, use a vpn, if you want to obfuscate location, use a proxy, if you want the government/your ISP to think you're performing illegal activity, use TOR.
deleted by creator
https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/
Here you go. TLS is transport layer security. Onion routing is on the network layer. If you don't understand something it isn't techno mumbo jumbo.
deleted by creator
Creating an alternative network protocol is still operating on the network layer. It's still network traffic. It behaves differently on the network layer than virtually all other network protocols.
deleted by creator
You have a fundamental misunderstanding of how the Internet works if you think TOR traffic is either completely separate or indistinguishable from other network traffic. Have a good day, hackerman.
Any recommendations for VPNs? I've seen recommendations to make your own but that reduces to the problem of an anonymous host for it.
I don't do anything fun over the Internet anymore so I don't really use one. If the CIA starts guantanamoing chapo.chat users I guess I'm just fucked.
why would they dissappear a bunch of libs?
deleted by creator
deleted by creator