Gee I wonder......
Maybe finding out that the NSA snoop every last thing you do?
The privacy-enhancing Tor network has seen its total number of users per day more than double in the last month, reaching the highest levels since the project first began compiling usage statistics. Graph of Tor users for August 2013 Tor traffic was up all over the globe in August 2013 – and we do mean up (Source: Tor …
My understanding is that a TOR client does not route traffic for any other client. For that, you need a TOR node. More clients will not improve TOR's speed. In fact it will do the opposite and slow TOR down. Instead, you need more TOR nodes. From what I've seen, though, service/hosting providers don't always like TOR nodes on their networks.
Your understanding is incorrect.
I qualified my statements with "presuming they choose to route traffic for other users". Diziet got it - any client can become a node if they choose. It is this type of user that will improve network performance.
"From what I've seen, though, service/hosting providers don't always like TOR nodes on their networks." - This is true only for exit nodes - that type of node serves as a boundary between the Tor network and the traffic's ultimate destination. The other, more common, type of node simply routes traffic between two Tor nodes. The traffic through this type of node cannot be inspected because it's encrypted, so ISPs have to basis for complaints.
After all a tor hidden service can even solve some complex problems. It's a simple way to punch through NA(P)T and to make sure you don't need to worry about changing IP-addresses. The good side effect is that you can add more noise to the spooks.
of their new Tor surveillance system.
They already know perfectly well what is going in and what is going out, so they just need to map the inside of the onion. If they flood the network with enough nodes, they can build up a connection map and re-trace most connections. That would also explain the explosion in Indian Tor usage. Probably some big outsourced server farm to cut costs.
Now where did I leave my tinfoil head... ?
Since Tor is real time and only lightly used, and huge parts of the network are monitored you can simply do the following attack:
Look at the amount of network traffic going through all points you monitor over time. Find correlations, those correlations likely result from the same connections going through those points. So even if it's encrypted and the addresses have been changed, it'll still have the same "beat". That's trivial to do if you monitor the whole network. In fact in many cases only a single connection will go through a Tor node. That's trivial to break.
The only way to get around this is to ditch real-time. Just have fixed sized messages. Then collect n of those messages at one of your mix points (which Tor already has) and send out m once you have collected enough information.
Back when Tor was created nobody thought that such a full surveillance was even possible.
Using a live version of Linux leaves no tracks on your computer's hard drive. And if that live Linux also implements TOR, then what's not to love?
Billed as "The Amnesic Incognito Live System," Tails is based on Debian Live 6.0.7.
https://tails.boum.org/about/index.en.html
Disclaimer: I am in no way affilated with the Tails project.
You download the iso file and burn it to a DVD blank. You can then use it to boot into Tails. It provides for making a bootable USB stick. Using a USB stick allows you to use the free space on it as a password-protected persistence folder. For instance, I have my bookmarks.html file from Firefox in it, so that I can load my bookmarks into the Iceweasel browser.
All online activity is forced onto TOR. The Linux kernal is version 2.X, which means that the Broadcom B43 wireless in this old Gateway laptop works; moreover the driver is included and activated. (Yes, I'm in Tails right now.)
It's free, so if you've been considering using a live operating system, it's worth a shot.
There is/was a "TOR button" addon for Firefox, but it's preferable to use the TOR Browser Bundle (which includes its own Firefox install) if you don't want to boot another OS. Using TAILS or Liberté is of course preferable to both.
A 1 Gb USB stick should be enough - the live CD is <700 Mb so you should have some room left over for persistent data.
The word Anonymity has never meant so much since Tor exists.
There is a darker side to the DeepWeb but it has always existed on the normal web as well, it was just a case of knowing where to look.
But the Tor is also useful for browsing other subjects which can be taken out of context and used against you. Ask anyone that has an interest in firearms, explosives, spy gadgets, cannabis, ( the list can go on for a long time) if they feel safe browsing the normal web nowadays. ( OK explosives is a bit overboard but from a technical point of view a very interesting subject)
I don't want or need Google et al recording everything that I am doing online, even if I am simply surfing for games or guitars: that is my business and I would like to keep it that way.
It's no longer about wearing tinfoil hats through choice, it has almost become a necessity.
"Ask anyone that has an interest in firearms, explosives, spy gadgets, cannabis, ( the list can go on for a long time) if they feel safe browsing the normal web nowadays."
Me: Um,... self, do you feel safe knowing you have done the preceding in addition to researching and tracking US military aircraft and their deployments in the last week - particularly the electronic command and control planes - not to mention your hobby of using Google Earth to check out airfields both civil and military all without even https?
Self: Don't you have some of that violent porn that Cameron et al. want to ban to jerk to before you visit your lady friend tonight, smoke the finest BC bud and perform acts that make the aforementioned grumble flicks seem like puritan sex ed?
/one man satire web theater
If Google doesn't record what you do, how can it provide you with what you want? The "flags" you listed pretty much apply to half the 18-35 male demographic, not exactly a good start for haystack needle searching.
If you need someone to taste/critique Cannabis Cup quality pot for you, drop me a line (just ask the NSA where I am).
Be interesting to see if there's been a proportional jump in data volume (if that's possible to obtain). For example, if there's a doubling of users but less than double the volume handled then it could suggest the clients are being used to exploit the network. OTOH, if there's been a bigger jump in data volume then maybe one of those Chinese ''users" is the Chinese government email gateway...
'Tor users in the US and the UK made up a large portion of the total in August. Around 90,000 Americans were connecting to Tor daily at the start of the month, but that figure grew to around 150,000 daily users by the end. UK daily users grew from around 16,000 to more than 35,000.'
As the Tor Project itself describes it, 'Tor prevents anyone from learning your location or browsing habits.'
So how do they even know the location of the new Tor users?
Tor allows you to choose an exit node in a particular country, or an exit node that isn't in a particular country.
This is useful if you want to visit a website that is censored by the authorities in some countries - China, UK and North Korea do that quite a lot. It is also useful if you want to visit a website operated by a racist website operator that provides an inferior experience to visitors who are not from certain countries. Most providers of streaming video services have racist access policies, including the BBC and Hulu.
Good point, one can of course manually set an exit node so that you always appear to be located in one geolocation, rather than the default random selection at startup.
But the article seems to be suggesting that they know the *origin* of Tor users, hence the stats that show the recent increase in use from US, UK and India, for instance.
Or did I read this wrong, and all they're saying is that there's in increase in Tor traffic from certain exit nodes?
"Most providers of streaming video services have racist access policies, including the BBC.."
Fancy clarifying that?
Is the BBC checking my ethnicity before delivering Bargain Hunt to my 'puter, or could they possibly be trying to restrict it to those that have a higher probability of having paid the licence fee?
I haven't paid a licence fee, but because my IP address is British, they are perfectly happy to deliver Bargain Hunt to my computer. There are plenty of people around the world who would be more than willing to pay £145.50 per year to watch Top Gear, but if they don't have a British IP address, then the BBC doesn't want their sort anywhere near their servers.
This post has been deleted by its author
I think it would be more correct to say it prevents any one person from learning your location and browsing habits. It's still possible to compile a list of IP addresses that are connecting to the network, and the ones that don't appear on the list of relay or exit nodes will be the end users.
However, what I'd really like to know is
1. Is Tor for normal people or just for subjects wishing to be nefarious?
2. Would me using Tor ring any alarm bells with my ISP/the law/anyone else?
3. Can't whoever is an exit node see all of my traffic? Or only just select packets? Or only just select conversations (e.g. an SMTP trace)? If I have Tor, it gives me anonymity but not security, so what else should I be aiming for?
1. Definitely both. Consider this for instance.
2. It will almost certainly increase the chance that the NSA (or equivalent agency) monitors your internet use closely. I don't think anyone lower than that has much interest.
3. It picks a different exit node every few minutes, but yes, they can eavesdrop. The obvious, though not necessarily foolproof, answer is to use other encryption such as HTTPS on top of it.
Users of TOR should remember that the German High Command believed that the Enigma system was impenetrable, with the possible exception of Admiral Donitz.
It's entirely possible that the whole system is transparent to the NSA, GCHQ etc. Even though it's open source let's not forget its origin.
... and Room 40 obviously.
Given that The Onion Router relies on the user encrypting the traffic for each node along the selected route, each node should be unaware of what lies beyond the next node. The dangers are:
+ the traffic leaving the exit node is transparent to the exit node if HTTPS hasn't been used.
+ that the complete series of selected nodes has been compromised, and your destination can be determined.
+ that your ISP or some agency detects you connecting to a TOR IP address and determines meaning from this.
+ that the encryption algorithms we use today have secretly been broken.
"You know Old Boy. We've got a load of those damned Enigma machines that we captured from the Jerries. The Germans swear by them, and I believe the Ruskis are giving them a go now. As a friendly power would you like a few? Got to keep those communications hush, hush - wink, wink - what, what?"
The minimum size of a USB stick is 2 GB. A 2 GB stick's actual size is ~1.9 GB. Tails requires ~1.5 GB, leaving ~400 MB for a persistent volume. The greater the capacity of the USB stick, the more space available for the persistent volume. (Yes, it is a volume, not a folder, as I mistakenly posted.)
You cannot install Firefox. You cannot install any programs. Tails is locked down; that's part of its security. You can copy a deb file into the persistent volume, and it will only extract; it will not install.
BTW, instead of a USB stick, you can use a Micro SD card inside a USB adapter. A Micro SD card will fit inside a hollow coin.
For any other info, visit the Tails Web site and read the docs.
"Why are you using Tor?"
"None of your business" 8-)
All kidding aside, people now realize the gov'ts are not even going to pretend to respect your privacy (as some have known for years), and they like to have a private life. More Tor, more PGP, more https. Maybe IPSec will start being actually used. This is not a bad thing, illegal spying programs aside this will help you avoid having your traffic sniffed at public wifi hotspots and so on.
I know at this point someone will assume this privacy will be all for black market dealings. It is not. I'm quite sure the very same people who think anyone wanting online privacy have something to hide, would not want a camera in their bathroom... even though they have nothing to hide, they are surely going in there to rock a piss or take a dump. Well, I'll respect your privacy and not pop a camera next to your toilet and you respect mine, thanks.
It seems to be a common human foible that those who resent any intrusion into their own privacy regard others with the same attitude as suspicious. There's also the authoritarian attitude of a certain fascist pig corporate CEO that if one doesn't want anyone else to know what he is doing, then maybe he shouldn't be doing it.
Why then, in our real lives, do we have doors and locks and curtains and drapes and safes and...? Why then, in our online lives, should we not avail ourselves of their cyber equivalents?
Privacy requires no justification. Privacy, for its own sake, is a fundamental human right.
I remember that in the bad old days when geeks were playing around with stacked up anonymous remailers they came up with a two-pronged action that would totally defeat traffic analysis - provided you really didn't care about time. The first part was to break up the messages into a random number of random sized parts, then randomly (maybe) add junk to the ends of the parts and encrypt them all separately. The next part of the process was to send them out with varying time delays - up to several hours - and via different routes.
I had a play with this myself, but you had to do a lot of the graft yourself in those days, and not all remailers had a time delay facility, so though it was interesting I pretty soon got bored with it all. I would imagine things are much more streamlined and pointy-clicky these days
I wonder if the Tor people have considered this. I'd be rather surprised if they hadn't!
I know I've been seeing a lot more attacks on my servers that I can trace back to a TOR exit node. I lack both the skill and the time (or motivation if I'm being honest -- tracing through TOR is too much effort for probably no gain) to track an attacker through TOR, so I generally stop there. There have been a ton of them the last couple weeks. I've been blacklisting the exit nodes as they pop up, but I've seen more of them the past 2 weeks than in the 6 years I've been at my current job.
Oh for heavens sake. I know you're El Reg but can we have slightly less Sun style reporting?
GCHQ didn't 'storm the Guardian', neither did the 'smash their computer equipment'. Their officers had an expenses paid trip to London so they could report to the political numbheads that the symbolic gesture had been carried out.
For all those trying to pretend that TOR is being used for "saving the World from dictatorships", it has long been possible to block it, as shown by the Chinese (http://www.cs.kau.se/philwint/static/gfc/). So that leaves it largely being used by criminals, paedos, skiddies downloading copied porn movies, and the tinfoil-attired.