NSA Trying Hard To Compromise Tor, But It's Still Mostly Safe

from the good-news dept

The latest from the Guardian out of the Ed Snowden leaks shows that the NSA and GCHQ have been trying desperately to target Tor, even though Tor is largely funded by the US government. The good news is that they basically haven't been able to attack the underlying Tor network, but rather rely on exploits elsewhere, such as within Firefox to try to target certain individuals.

Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal that the agency's current successes against Tor rely on identifying users and then attacking vulnerable software on their computers. One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets' computers, including access to files, all keystrokes and all online activity.

But the documents suggest that the fundamental security of the Tor service remains intact. One top-secret presentation, titled 'Tor Stinks', states: "We will never be able to de-anonymize all Tor users all the time." It continues: "With manual analysis we can de-anonymize a very small fraction of Tor users," and says the agency has had "no success de-anonymizing a user in response" to a specific request.

Another top-secret presentation calls Tor "the king of high-secure, low-latency internet anonymity".

In response to all of this the NSA put out one of its typically bland and empty statements about how what it does is "authorized by law" and it should be no surprise that it's seeking information on bad people.




Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: anonymity, attacks, gchq, nsa, nsa surveillance, tor, vulnerabilities


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    Ninja (profile), 4 Oct 2013 @ 11:15am

    They tried to cut the onion and ended up crying eh? /pun

    And given the sparked interest in privacy and better security they'll be having more reasons to cry in the future. Much for the benefit of the rest of us.

    link to this | view in chronology ]

  • icon
    Baldaur Regis (profile), 4 Oct 2013 @ 11:15am

    If by "seeking information on bad people" the NSA means "pantsing the entire population of Earth", then yes, that statement is true.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 11:21am

    I am torrified I say.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 4 Oct 2013 @ 12:27pm

      Re:

      torrorist !

      link to this | view in chronology ]

    • icon
      btrussell (profile), 8 Oct 2013 @ 3:42am

      Re:

      Why? They are just looking for torists, also spelt "tourists."

      More jails are being built. These are sunk costs and are very costly unless you are utilizing them fully.

      link to this | view in chronology ]

      • icon
        Niall (profile), 10 Oct 2013 @ 5:09am

        Re: Re:

        Nah, just rededicate them as student accommodation! They'll be better than most commercially available...

        link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 11:23am

    Deterministic builds

    Tor and Bitcoin are two projects which go further than most when it comes to security. For instance, they are working on deterministic builds (https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise), which will allow anyone to validate that the downloaded binaries were produced from the published source code, and have not been modified afterwards.

    With most projects, even free/open-source software, you have to trust that the build machines have not been compromised. With deterministic builds, even this risk is reduced.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 11:32am

    Bad people my ass... They go after anyone they please.... and kill them. The US has an auto immune problem. The people who are supposed to protect us have decided �let's murder them instead".

    link to this | view in chronology ]

    • identicon
      LivingParadox, 28 Jan 2014 @ 5:12am

      Re:

      agreed. the us government as well as the nsa's opinion of a "bad person" is essentially anyone who disagrees or chanlenges thier establishment. that demographic doesnt apply to nearly as many people as it should.

      privacy is a natural human right in my opinion and for anyone to take that away from anyone is very wrong.

      the whole system is designed to collapse... and soon. its not just the internet that is in trouble.

      "End the fed, Arrest the Banksters!"

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 12:04pm

    The definition of bad people, made up by a government gone rabid along with an agency that has no concept of truth, right to privacy, nor moral compass that has been shown time and again to be broken, is not of any comfort at all.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 24 Jan 2014 @ 1:51pm

      Re:

      This is why some believe in perpetual war.... Let the jackasses that WANT to go around killing people get ewch other

      link to this | view in chronology ]

  • identicon
    LOL, 4 Oct 2013 @ 12:05pm

    lol

    Meh, prove it.

    link to this | view in chronology ]

  • identicon
    Mark Wing, 4 Oct 2013 @ 12:06pm

    If they can't de-anonymize Tor, then they can certainly demonize it. That seems to be the current strategy for defeating it. If you can't defeat the technology, then show the world all the bad things it's being used for, so everyone will throw the baby out with the bath water.

    link to this | view in chronology ]

  • icon
    PopeRatzo (profile), 4 Oct 2013 @ 12:31pm

    Reminds me to install Tor

    This story is a reminder set up Tor on all the machines in my house, if only to have and to make the NSA work a little harder.

    What would happen if all of a sudden an additional billion people started using Tor? Make them drop their "national security" mask so the opposition can really take hold.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 24 Jan 2014 @ 1:58pm

      Re: Reminds me to install Tor

      I still think they are monitoring TOR by controlling the nodes on mil bases

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 12:36pm

    If Tor becomes compromise where will I go to buy my heroin and assassins?

    /s

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 12:54pm

    what is ... S//SI/REL ?

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 1:27pm

    Tor is no obstacle to NSA surveillance

    I'm sure this information is quite outdated (it's from way back in 2007) and misleading. An adversary with as much access to online traffic as the NSA can easily break a system like Tor by correlating traffic between clients, relay nodes, exit nodes and websites. If you think they're not already doing this, you are being naive.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 1:28pm

    but rather rely on exploits elsewhere, such as within Firefox to try to target certain individuals.


    I'm REALLY curious about this, does anyone know if this is a vulnerability in this software bundle or a problem with all Firefox browsers or Windows PCs?

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 4 Oct 2013 @ 1:28pm

      Re:

      One technique developed by the agency targeted the Firefox web browser used with Tor


      Meant to quote this, sorry.

      link to this | view in chronology ]

      • icon
        Chronno S. Trigger (profile), 4 Oct 2013 @ 3:40pm

        Re: Re:

        If I remember correctly, there is an old vulnerability that javascript code can take advantage of in Firefox 17. Firefox 17 is the version that comes bundled in the Tor Browser with the NoScript addon disabled. The easiest way around that problem is to enable NoScript.

        link to this | view in chronology ]

    • icon
      John Fenderson (profile), 4 Oct 2013 @ 1:57pm

      Re:

      It's impossible to say without knowing the specifics of the technique(s) they're using.

      Speaking generally, pretty much every nontrivial program that uses the internet has vulnerabilities (that's a corollary to the fact that every nontrivial program has bugs). Many of these vulnerabilities are kept secret, so you probably won't know of them if you aren't the producer of the software, a spy, and/or a cracker.

      link to this | view in chronology ]

  • icon
    Sheogorath (profile), 4 Oct 2013 @ 1:41pm

    Wait, that sounds familiar...

    You can de-anonymize some of the users all of the time, and all of the users some of the time, but you cannot de-anonymize all of the users all of the time.
    With apologies to Abraham Lincoln(?).

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 2:09pm

    If I were a criminal defense attorney

    ...I'd probably be signing up new clients by the score. Mr. Snowden has revealed that the NSA is guilty of who knows how many thousands of counts of numerous federal crimes, among them computer hacking & authoring and distributing malware. If the local federal D.A. gets some of his/her cases dismissed on technicalities due to questionable or improper police work, I don't see how the legal system can survive not upholding the same standard for these pricks.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Oct 2013 @ 3:33pm

    Even if the NSA can de-anonymise some Tor users through correlation. I'm not worried, because I'm a law-abiding citizen using Tor to opt-out of PRISM and exercise my 1st amendment right.

    If the NSA want's to waste valuable resources trying to figure out what I do online. That's their choice.

    Anything I can do to make their unconstitutional spying harder, is worthwhile.

    link to this | view in chronology ]

  • icon
    Postulator (profile), 4 Oct 2013 @ 9:10pm

    Because if I don't want someone looking over my shoulder at everything I do on the Internet I'm a "bad person"?

    Thanks NSA for protecting the world, one rewritten dictionary at a time.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 5 Oct 2013 @ 3:39am

    This is EXACTLY why the Tor project should compartmentalize development.

    The development of a "Tor Browser Bundle" is plain stupid. Tor should be developed, a few browsers should be hardened and configured for Tor usage, as well as other clients for other protocols.

    But they'll never do that, as they've made clear again and again.

    link to this | view in chronology ]

  • identicon
    AnonymousRat, 5 Oct 2013 @ 7:46pm

    Lack of knowledge

    Reading the posts here it appears that about 95% of the posts are from those who have not a clue what Tor is, how it works and may not even know what PGP is much less how it works.
    I'm from the old school. I was in Crypto before PGP.
    I was Navy. What department will go forever undisclosed.
    What I'm reading here is so sgnorant it's hard to stomach.
    There are actually a few intellegent comments though.
    AnonymousCoward you are pretty much knowledgeable and are leading the pack here with common sense.
    Most of the rest of you should stop posting do a little more reading. Not here, go read about PGP, read about routing, read the history of PGP written by Phil Zimmerman who wrote and published it in the early 90's.
    Who was hounded by the US Communist run government.
    I helped to pay for his defense in those days.
    Go learn. You will never learn by just blabing about what you don't know.
    I still use Tor and what I use it for could be potentially life threatening.
    No I am not violating any laws of my country. I'm trying to help those who have not the freedom you have.
    Keep writing I want to learn just how ignorant my fellow citizens are.

    link to this | view in chronology ]

    • identicon
      Anonymous, 6 Oct 2013 @ 5:56am

      Re: Lack of knowledge

      The government has for several years had the ability to decrypt PGP through the use of a program called Magic Lantern.

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 12 Oct 2013 @ 5:02pm

      Re: Lack of knowledge

      thanks for your service man. I was an army ranger so I get what you are doing.

      link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.