On 06/04/2023 18:12, efc@swisscows.email wrote:
"Tor StinksĀ -- NSA, vulns known since before 2012"
Well before, in fact before TOR was even started. The initial developers
- Roger, Nick and Paul - were well aware of them. I was there in the bar
when they discussed starting it. I was there again in a different bar
when Roger announced he had gotten the initial funding.
I did point out the problems regarding global APTs, but they were all
well aware of them anyway.
Roger's take was if properly implemented TOR would be effective against
lesser adversaries like third world countries, some LEAs, and
businesses. It was never meant to resist the NSA, the FBI or even the US
Navy for that matter.
I'm not sure what Paul thought.
Nick was mostly just carried along as chief programmer. He had been lead
programmer on Mixminion and "defected" to TOR probably because he
thought it would be cooler. Incidentally this left Mixminion in a bit of
a pickle.
I was not aware of this, so thank you very much for informing. When it
comes to forking tor there is another problem though, and that is all
the infrastructure. Like FB, tor has some strong networking effects so
starting from scratch would be tough. I do hope that someone does fork
though, and that a new, stronger and less woke project might take over
instead.
Forking TOR wouldn't help any. The problem is user expectations, or
perhaps perceptions of user expectations.
At one of the PET workshops {these discussed much of the academic
background to the technology behind TOR, Mixminion etc} someone
presented a paper on how long a user would wait for a reply to a web
request. Up jumps an attendee who says he and some colleagues had
already done a paper on this, and the answer was 5 seconds. Ooops.
Now for a 5 second maximum response time it is technologically
infeasable to implement an untrusted onion network which resists attack
by a global persistent threat like the NSA or GCHQ.The APT just
temporally correlates data exiting the endpoints.
The network can introduce timing jitter and packet size standardisation
or variation in order to make this harder, but with cost-limited dummy
traffic and a maximum 5 seconds response time it can't reliably stop it.
It cain't be done.
On another note, I'm a bit out of date here, but at one point most TOR
traffic went through German servers. Bet the BND loved that.
Peter Fairbrother