Tor Project releases addon that lets one help censored users access the Tor network

The links to the addon store listings of the extension can be found on the official website: https://snowflake.torproject.org

And some documentation about how it works is at: https://trac.torproject.org/projects/tor/wiki/doc/Snowflake

Snowflake is a new circumvention system currently under development. It is based on peer-to-peer connections through ephemeral proxies that run in web browsers. Snowflake proxies are lightweight: activating one is as easy as browsing to a web page and shutting one down only requires closing the browser tab. They serve only as temporary stepping stones to a full-fledged proxy. Snowflake derives its blocking resistance from having a large number of proxies. A client may use a particular proxy for only seconds or minutes before switching to another. If the censor manages to block the IP address of one proxy, there is little harm, because many other temporary proxies are ready to take its place. https://bamsoftware.com/papers/thesis/#chap:snowflake

In particular it uses WebRTC for communicating between the censored user and the proxy that you’ll be running so one needs to have WebRTC enabled in their browser (the addon detects if you have WebRTC enabled). And here’s a schema of how the thing works:

Censored user <–[WebRTC]–> Snowflake Proxy (you) <–[WebSocket]–> Bridge <----> Middle Node <----> Exit Node <----> Web Site

1 Like

That’d be nice, if only TOR wasn’t ownt

Tor isn’t owned according to the NSA (at least as far as 2013, edwardsnowden . com/docs/doc/tor-stinks-presentation.pdf ). There’s a reason that Snowden is still recommending it (and using it as his daily driver).

I’m not saying the NSA owns Tor.

I’m saying that if you control the exit nodes, you control the traffic.

If you control the traffic, you can de-anonymize anyone whose traffic you gather.

Tor is a cool concept and had it’s day, but it seems to be that it’s over now.

Also, Snowden isn’t anything special. He is just a man of conscience who decided to leak some very incriminating docs. I thank him for that, it’s been a service, but don’t idolize him. It’s just as bad as the Ballmer or Stallman or Torvalds worshipers.

1 Like

This isn’t exclusive to Tor and will apply to any anonymity network in existence.

Seeing the exit traffic is not sufficient to de-anonymize someone, you need to see the entry traffic to make a correlation attack.

I’d like to see some proof for that since Tor keeps on getting better, for example in 2013 it didn’t even have first party isolation, now by using the Tor Browser you get a different circuit (and hence different exit node) for every first party domain that you visit, making it extremely hard for a single adversary to see all of your exit traffic.

I agree, I’m not and we shouldn’t be idolizing him.

As of right now, there are only 6571 active Tor nodes in the entire world.

http://torstatus.blutmagie.de/

If you control a substantial proportion of the nodes, comprising of the initial and exit nodes for any given connection, you can use timing attacks to find their originating IP address.

Now, half of that number, 3,285, is a ton of computers for someone like you and me to handle. Even one tenth of that would be a huge undertaking and very expensive. But for a nation-state? Even a small one? Peanuts.

2 Likes

There was a study on this, I’ll grab it when I’m not working.

That’s chump change for an agency looking to run an op.

Let’s say you only need to run that for a month. Let’s crank that number up to 6571 because they’d want to control half the nodes.

That’s really not a whole lot of money for a properly motivated organization or individual.

That really will only cost 250k a month at the full 6571. That’s nothing dude.

Yes, that was my point. It’s safe to assume Tor has been completely compromised. Not because the technology is bad-- it isn’t. Because it simply isn’t popular enough to defend against governments spending a pittance on servers.

They’re being very careful about using that information, always carefully coming up with plausible explanations of how they deanonymized drug markets and such on Tor. But it’s a honeypot now.

1 Like

The fundamental flaw isn’t in the technology. It’s in the meatbags that use it.

2 Likes

Sure, some people have poor opsec and can be traced by the use of similar usernames and such. That’s actually the reverse-construction plausible explanation used to catch Ross Ulbricht for the original Silk Road. Could they have caught him that way? It’s possible. But more likely they deanonymized him through compromised Tor nodes.

Anyway, the problem with Tor is it’s too damn slow. It’s unusable. It’s so slow that you would only use it for seriously illegal activity. Primarily junkies, kiddie twiddlers, and people living under oppressive regimes. And that feeds upon itself-- because it’s slow, most people won’t use it, and that limits the number of nodes, which makes it slow.

1 Like

When I used it, it was alright. I got about 35mbps down, 6 up. Not bad at all.

Problem is more response time than bandwidth, although bandwidth is also limited. Last time I messed with it, which was admittedly a couple years back, it took 2-3s to get that first packet through. Agonizing.

  1. Nationstates don’t need to run nodes to see Tor exit traffic.

  2. Tor was built under the assumption that attackers control a portion of exit node traffic (See “3.2. Adversary Capabilities - Positioning 1. Exit Node or Upstream Router” in: torproject . org/projects/torbrowser/design/)

  3. Even if nationstates are able to de-anonymize everyone (something that even the NSA fails at as it admits in its 2013 slides) Tor still protects you against your ISP, the website you’re visiting, ad networks, trackers, … In general, using Tor is better than not (if you care about privacy – but even if you don’t it’s a good idea since the more people use it the better the anonymity gets for everyone).

  1. Citation needed.
  2. Correct. They also admit that is a problem, just one they choose not to defend against.
  3. Other than protecting against your ISP tracking, I think you’re mixing up Tor itself with the Tor browser, which has a bunch of anti-fingerprinting stuff and noscript.

It’s 2019 that’s a long time ago

Sure but as I mentioned Tor has been improving as well.

Also NSA attacks on the Tor Browser (as opposed to Tor itself) going back to 2007 were successful, including codename EGOTISTICALGIRAFFE.

“TOR stinks” was 2012 and does discuss exploiting/compromising nodes. It doesn’t talk about paying to host their own nodes, however. But that was 7 years ago.

1 Like
  1. No citation is needed for that claim, the NSA doesn’t need to run Tor exit nodes when it can already watch traffic directly.

  2. It’s part of the threat model so they do take measures to defend against it.

  3. Tor Browser (without Tor) isn’t sufficient to protect against tracking (you can be tracked with your IP address). Using a VPN won’t change that as well since there’s no first party isolation (different circuit = different IP for each first party domain = no single server can see your whole traffic).

By the way I’d be happy to hear what your alternatives to Tor are :slight_smile:

Oh I misread your post. Exit traffic only. That’s true enough.

There is no defense against an attacker running or compromising a substantial portion of the network.

There is no comparable alternative. The solution is for people to run a lot more Tor nodes. I don’t see how you get there, though.

1 Like

If you’re really worried about correlation attacks you can run your OWN non-exit node/bridge and connect to it directly. Since correlation attacks require control of both the guard node and the exit they won’t be successful if you run your own guard node, hence no single entity can control both the guard node and the exit node (except a global passive adversary).