Hi, I am a cybersecurity researcher, investigative journalist, and 
whistleblower female.

I have studied networking, network security, cybersecurity, privacy and 
anonymity principles, and similar topics for over 10 years.

I became an investigative journalist then whistleblower to investigate crimes 
committed by various government persons.

I used Tor to leak information implicating various governments persons in 
various crimes.

I believe Tor was infiltrated and compromised, a backdoored was added, or Tor 
was made easier to trace, or similar, because I have survived a targeted 
assassination attempt. This was not a random occurrence, and not a theory, it 
was a confirmed, via laboratory analysis, an assassination attempt by criminal 
government agents to target a hero whistleblower human-rights defender in a 
covert assassination attempt.

We should not just do anything the Government asks just because of their title 
"the government", because sometimes real genuine bad criminals can be in 
government positions. We must respect the individual rights of each user, by 
ensuring the Tor software is fully secure.

I believe the criminals in the various governments, compromised Tor via bribing 
a Tor Dev, or making an excuse like "national security" or any other list of 
government talking points to compromise it, and the criminals added a backdoor, 
or made Tor easier to trace in some manner. So then, the criminals in the 
various governments, could identify me, locate me, and assassinate a hero 
whistleblower in a targeted manner.

If they could find me they could find any Tor user. I changed my writing style, 
had a firewall, fully updated system firmware and software, used a new 
operating system installation on new hardware, on public wifi etc to prevent 
side-channel exploits.
Thus I believe the vulnerability was within Tor itself.

Thus, I conclude various steps need to occur to re-secure Tor.

1. We must conduct a top-to-bottom/comprehensive code security audit for all of 
Tor Browser and Tor Relays code.
We must find, patch, and secure any vulnerabilities, weaknesses, or backdoors 
and re-secure the Tor code.

2. We should introduce additional traffic-analysis resistance measures into 
Tor, such as circuit padding for all connections/more connections, random 
connection delays like iat-mode=1/2 for all connections, and possibly decoy 
traffic. I also think having a Snowflake-add-on-like option to make every Tor 
user a small relay would enhance traffic-analysis resistance.

Tor says it can't defend well against a global network observer. But we do have 
global network observers in the world, which we should build defenses against.

We also need to ensure the code is fully open source, because corrupted 
government agents can try to make excuses to compromise Tor and use their badge 
and title to try to compromise the network. The corrupt government persons 
could stage events to make Tor look bad to try to justify compromising it. We 
must have Tor be immune to such suggestions, by being outside of the reach of 
any corrupt governments influence.

If Tor is un-saveable, we should start a new Tor-like software, outside of the 
reach of any and all governments influence on a private island or small country 
or territory without any influence over our decision making.

We can start another, several new anonymity projects outside of the US, Canada, 
France, Germany, UK, NZ, AU. Away and immune from governments influence.

The criminals became donors of Linux kernel and Tor and other privacy projects 
and used their donor status to try to weaken the security. Beware any donors 
involved in c0v1d-19 contact tracing or similar topics. Beware donors who came 
in around 2019+. Thus we must check for and patch security vulnerabilities in 
Linux, Tor, and other privacy services.

Thus, in order to ensure Tor and every Tor user is safe and secure, we must 
never degrade, backdoor, weaken, or make more easily traceable, any aspect of 
Tors code.
Tor must be fully secure, non-backdoored, private, secure, and anonymous for 
all Tor users benefit, as journalists, human rights defenders, and 
whistleblowers working for the common good, depend on Tor for their safety.

We should setup more relays in diverse locations/datacentres. We should 
reformat and re-install Tor relays to clear infections/exploits that might be 
currently running. We should enhance Tor Relays security by for example using a 
Firewall, HTTPS update servers, and perhaps additional hardening, and Intrusion 
Detection Systems like Snort and Suricata to detect exploit-like behavior, to 
secure the relays operating systems.

We should accelerate the codebase transition to Rust to be more exploit 
resistant.

We must keep Tor secure, for every user, we must check all of Tors entire 
codebase and re-secure it.
For the benefit of every privacy-loving netizen,
Re-secure Tor,
Love,Neo's Sister.

Reply via email to