On 08/07/2013 03:26 AM, Bill Woodcock wrote:
On Aug 7, 2013, at 12:05 AM, Roger Dingledine <[email protected]> wrote:
Consider two scenarios. In scenario one, NSA doesn't run any Tor
relays, but they have done deals with AT&T and other networks to be
able to passively monitor those networks -- including the (honest,
well-intentioned) Tor relays that run on those networks. They're able to
monitor some fraction of the Tor network capacity -- whether that's 1%
or 10% or 30% is a fine question, and depends on both Internet topology
and also what deals they've done.

In scenario two, they do that plus also run some relays. They have to
deal with all the red tape of deploying and operating real-world things
on the Internet, and the risk that they'll do it wrong, somebody will
notice, etc. And the benefit is maybe a few percent increase in what
they can watch.

Why would they choose scenario two?
Geographic reach.  In order to observe exit and entry nodes that are not within 
the coverage footprints of the telcos with whom they have special relationships.

1) Rent VPS with CC that doesn't connect back to the agency (or hell, generate some Bitcoins
on a rig somewhere and pay with those)
2) Run patched version of Tor for relay or exit node that leverages Tor to phone home without disclosing "home"
3) Repeat

Anyone outside of the VPS and the attacker cannot know whether that relay/exit node has been patched. Now just work with the NSA's equivalent in the country of the exit node to make sure the VPS remains unaware of any shenanigans (and why wouldn't they?). If they do see something weird happening from the patch and make some noise about it then just gag them as the Guardian reports show they are quite good at doing.

Roger-- how exactly would you check to make sure something like this scenario isn't
happening?

-Jonathan


                                 -Bill






--
Liberationtech list is public and archives are searchable on Google. Too many 
emails? Unsubscribe, change to digest, or change password by emailing moderator 
at [email protected] or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Liberationtech list is public and archives are searchable on Google. Too many 
emails? Unsubscribe, change to digest, or change password by emailing moderator 
at [email protected] or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to