dicksi Posted July 30, 2014 Report Posted July 30, 2014 Question: Should You Trust Tor?Answer: Not If Your Life Is At StakeBy Bill Blunden, July 16, 2014In the ongoing drizzle of Snowden revelations the public has witnessed a litany of calls for thewidespread adoption of online anonymity tools. One such technology is Tor, which employs a networkof Internet relays to hinder the process of attribution. Though advocates at the Electronic FrontierFoundation openly claim that “Tor still works[1]” skepticism is warranted. In fact anyone riskingincarceration (or worse) in the face of a highly leveraged intelligence outfit like the NSA would be illadvisedto put all of their eggs in the Tor basket. This is an unpleasant reality which certain privacyadvocates have been soft-pedaling.The NSA Wants You To Use TorTor proponents often make a big deal of the fact that the NSA admits in its own internal documents that“Tor Stinks,” as it makes surveillance more work-intensive[2]. What these proponents fail to acknowledgeis that the spies at the NSA also worry that Internet users will abandon Tor:“[A] Critical mass of targets use Tor. Scaring them away from Tor might be counterproductive”Go back and re-read that last sentence. Tor is a signal to spies, a big waving flag that gets their attentionand literally draws them to your network traffic[3]. Certain aspects of Tor might “stink” but ultimately theNSA wants people to keep using Tor. This highlights the fact that security services, like the FBI[4], havedeveloped sophisticated tools to remove the veil of anonymity that Tor aims to provide.For example, the Washington Post reports[5]:“One document provided by Snowden included an internal exchange among NSA hackersin which one of them said the agency’s Remote Operations Center was capable oftargeting anyone who visited an al-Qaeda Web site using Tor.”It’s well known that Tor is susceptible to what’s called a traffic confirmation attack (AKA end-to-endcorrelation), where an entity monitoring the network traffic on both sides of a Tor session can wieldstatistical tools to identify a specific communication path. Keep in mind that roughly 90 percent of theworld’s internet communication flows through the United States[6], so it’s easy for U.S. intelligence todeploying this approach by watching data flows around entry and exit points[7].Another method involves “staining” data with watermarks. For example, the NSA has been known tomark network traffic by purchasing ad space from online companies like Google. The ads cause webbrowsers to create a cookie artifact on the user’s computer which identifies the machine viewing thead8. IP addresses may change but the cookie and its identifiers do not.De-cloaking Tor users doesn’t necessarily require a federal budget either. According to a couple ofresearchers slated to speak at Black Hat in a few weeks[9]:“In our analysis, we've discovered that a persistent adversary with a handful of powerfulservers and a couple gigabit links can de-anonymize hundreds of thousands Tor clientsand thousands of hidden services within a couple of months. The total investment cost?Just under $3,000.”Client Network Exploitation (CNE) Trumps CryptoBack in 2009 security researcher Joanna Rutkowska implemented what she dubbed the “Evil Maid”attack to foil TrueCrypt’s disk encryption scheme[10]. By compromising the Windows boot environmenther team was able to capture the hard disk’s encryption passphrase and circumvent TrueCrypt’sprotection. While users can [usually] defend against this sort of monkey business, by relying on a trustedboot process, the success of the Evil Maid attack underscores the capacity for subversion to trumpencryption.This type of client-side exploitation can be generalized for remote network-based operations. In anutshell, it doesn’t matter how strong your network encryption is if a spy can somehow hack yourcomputer and steal your encryption passphrase (to decrypt your traffic) or perhaps just pilfer the datathat they want outright.Enter the NSAs QUANTUM and FOXACID tag team. QUANTUM servers have the ability to mimic websites and subsequently re-direct user requests to a second set of FOXACID servers which infects theuser’s computer with malware[11]. Thanks to Ed Snowden it’s now public knowledge that the NSA’s goal isto industrialize this process of subversion (a system codenamed TURBINE[12]) so it can be executed on anindustrial scale. Why go to the effort of decrypting Tor network traffic when spies can infect, infiltrate,and monitor millions of machine at a time?Is it any wonder that the Kremlin has turned to old-school typewriters[13] and that German officials haveactually considered a similar move[14]? In the absence of a faraday cage even tightly configured airgappedsystems can be breached using clever radio and cellular-based rootkits[15]. As one user shrewdlycommented in an online post[16]:“Ultimately, I believe in security. But what I believe about security leaves me far from thecutting edge; my security environment is more like bearskins and stone knives, becausebearskins and stone knives are simple enough that I can *know* they won't dosomething I don't want them to do. Smartphones and computers simply cannot providethat guarantee. The parts of their security models that I do understand, *won't* preventany of the things I don't want them to do.”Software is hard to trust, there are literally thousands upon thousands of little nooks where a flaw canbe “accidentally” inserted to provide a back door. Hardware is even worse.DenouementAbout a year ago John Young, the operator of the leaks site Cryptome, voiced serious concerns in amailing list thread about the perception of security being conveyed by tools like Tor[17]:“Security is deception. Comsec a trap. Natsec the mother of secfuckers”Jacob Appelbaum, who by the way is intimately involved with the Tor project, responded:“Whatever you're smoking, I wish you'd share it with the group”Appelbaum’s cavalier dismissal fails to appreciate the aforementioned countermeasures. What betterway to harvest secrets from targets en mass than to undermine a ubiquitous technology that everyonethinks will keep them safe? Who’s holding the shit-bag now? For activists engaged in work that could getthem executed, relying on crypto as a universal remedy is akin to buying snake oil. John Young’s stancemay seem excessive to Tor promoters like Appelbaum but if Snowden’s revelations have taught usanything it’s that the cynical view has been spot on.http://cryptome.org/2014/07/trusting-tor-not.pdf Quote