Re: [tor-talk] Is this still valid?

2015-06-25 Thread Seth David Schoen
Seth David Schoen writes:

 If you read the original Tor design paper from 2004, censorship
 circumvention was actually not an intended application at that time:
 
 https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf
 
 (Tor does not try to conceal who is connected to the network.)

The connection to censorship circumvention is that, on a censored
network, people are normally not allowed to connect to censorship
circumvention services (that the network operator knows about).  So if
you allow the network operator to easily know who is connecting to the
service -- as the 2004 version of Tor always did -- they can block it
immediately (as several governments did when they noticed Tor was
becoming popular in their countries).

Now that Tor also has censorship circumvention as a goal, there are
several methods it can use to try to disguise the fact that a particular
person is connected to the Tor network.

-- 
Seth Schoen  sch...@eff.org
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this still valid?

2015-06-25 Thread Seth David Schoen
U.R.Being.Watched writes:

 http://www.deseret-tech.com/journal/psa-tor-exposes-all-traffic-by-design-do-not-use-it-for-normal-web-browsing/

There are some mistakes in the article -- for example the notion that
Tor was built for a specific purpose, which was the circumvention of
restrictive firewalls like the Great Firewall of China.

If you read the original Tor design paper from 2004, censorship
circumvention was actually not an intended application at that time:

https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf

(Tor does not try to conceal who is connected to the network.)

That has subsequently changed, the project adopted anticensorship uses
as an additional goal, and nowadays Tor does sometimes try to conceal
who is connected to the network, when they ask it to.  (Sometimes this
succeeds against a particular network operator, and sometimes not.)

But the original design goal was privacy in a particular sense, and
not censorship circumvention.

My colleagues and I made an interactive diagram a few years ago to try
to explain the same concern that this article presents.

https://www.eff.org/pages/tor-and-https

One part of it is that if you use Tor without additional crypto protection
to your destination (like HTTPS), a different set of people can eavesdrop
on you than if you didn't use Tor at all.  That's definitely still
true and is always a basic part of Tor's design.  You might think those
people are better or worse as eavesdroppers than the nearby potential
eavesdroppers.  The faraway eavesdroppers might be more organized and
malicious about it, but they also might start out not knowing who you are.
Whereas the nearby eavesdroppers might physically see you, or have issued
you an ID card, or have your credit card.

As we thought when we made that diagram, probably the best solution for
this is more and better HTTPS.  At some point (which may already be in the
past), it might even be a good idea for Tor Browser to refuse to connect
to non-HTTPS sites by default, although that might be a difficult policy
to explain to users who don't understand exactly what HTTPS is and how
it protects them, and just see that Tor Browser stops being able to use
some sites that Internet Explorer can work with.

-- 
Seth Schoen  sch...@eff.org
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this still valid?

2015-06-24 Thread U.R.Being.Watched
http://www.deseret-tech.com/journal/psa-tor-exposes-all-traffic-by-design-do-not-use-it-for-normal-web-browsing/

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this still valid?

2015-06-24 Thread aka
Your traffic is visible to the exit node.

The exit node has to transmit your traffic in plaintext if your
destination doesn't support TLS. Same goes for your ISP, country,
company firewall and so on. This vulnerability can't be fixed without
proper end-to-end encryption.

You are much safer with just the NSA spying on you than all the people
you invite to spy when you utilize Tor indiscriminately.
This is questionable as the NSA is known give lethal drone strike
targets while your average cyber criminal only steals your facebook
accounts for spam

U.R.Being.Watched wrote:
 http://www.deseret-tech.com/journal/psa-tor-exposes-all-traffic-by-design-do-not-use-it-for-normal-web-browsing/
 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-06 Thread Andrew F
 On 08/05/2013 06:53 PM, Crypto wrote:

On 8/5/2013 1:29 PM, Andrew F wrote:

 Is Tor still Valid now that we know the nsa is actively exploiting holes in
technology anonymity tools?  We know that Tor and hidden services has
issues, not to mention the whole fingerprinting problems.

Is Tor too vulnerable to trust?Watch the video below.

XKeyscorehttp://www.youtube.com/watch?v=TSEbshxgUas

 I'm curious as to why everyone is so intent on blaming Tor itself? Tor
was not exploited. It was a hole in FF 17 in conjunction with the
application running behind the hidden service. It's like saying My car
got a flat tire! Should I ever drive again? I agree that the exploit
was a bad one and in turn it's a big security issue. But if we're going
to point fingers let's not point at Tor. Let's focus on the underlying
issue(s) that caused this to happen. FF 17 was the target, not Tor.
Mozilla has addressed the issue. How did the exploit occur? Let's look
at the application(s) that were running behind the hidden service.


 That was not my focus. My concern is for known Tor venerabilities that are
documented and know by all.
If we know that Government agencies are actively and successfully attacking
soft technology targets. then how can we assume the know Tor Venerabilities
are not being used at this very moment.   The Tor Venerabilities are going
to be dealt with one day.. but what about right now.  We know about them,
therefore everyone knows about them.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-06 Thread Andrew F
This is one of the reasons I only use tails.  As tails is a live cd every
time you boot up you get a fresh system.  So any viruses are wiped away.
Of course they have already done there work in the last session.   But with
windows.. every time you fire up Tor, they could be watching with this
exploit.  At least with tails you gotta make them work for it and install
fresh every time.


On Tue, Aug 6, 2013 at 5:00 AM, Andrew F andrewfriedman...@gmail.comwrote:

  On 08/05/2013 06:53 PM, Crypto wrote:

 On 8/5/2013 1:29 PM, Andrew F wrote:

  Is Tor still Valid now that we know the nsa is actively exploiting holes in
 technology anonymity tools?  We know that Tor and hidden services has
 issues, not to mention the whole fingerprinting problems.

 Is Tor too vulnerable to trust?Watch the video below.

 XKeyscorehttp://www.youtube.com/watch?v=TSEbshxgUas

  I'm curious as to why everyone is so intent on blaming Tor itself? Tor
 was not exploited. It was a hole in FF 17 in conjunction with the
 application running behind the hidden service. It's like saying My car
 got a flat tire! Should I ever drive again? I agree that the exploit
 was a bad one and in turn it's a big security issue. But if we're going
 to point fingers let's not point at Tor. Let's focus on the underlying
 issue(s) that caused this to happen. FF 17 was the target, not Tor.
 Mozilla has addressed the issue. How did the exploit occur? Let's look
 at the application(s) that were running behind the hidden service.


  That was not my focus. My concern is for known Tor venerabilities that
 are documented and know by all.
 If we know that Government agencies are actively and successfully
 attacking soft technology targets. then how can we assume the know Tor
 Venerabilities are not being used at this very moment.   The Tor
 Venerabilities are going to be dealt with one day.. but what about right
 now.  We know about them, therefore everyone knows about them.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-06 Thread mirimir
On 08/06/2013 05:20 AM, Andrew F wrote:

 This is one of the reasons I only use tails.  As tails is a live cd every
 time you boot up you get a fresh system.  So any viruses are wiped away.
 Of course they have already done there work in the last session.   But with
 windows.. every time you fire up Tor, they could be watching with this
 exploit.  At least with tails you gotta make them work for it and install
 fresh every time.

If this exploit had included a Linux component, Tails would not have
protected you. To be safe, apps and tor client must be in different
machines, or at least in different VMs. Whonix and Qubes do that. Or you
can do it yourself.

SNIP

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-06 Thread Gregory Maxwell
On Mon, Aug 5, 2013 at 11:41 PM, intrigeri intrig...@boum.org wrote:
 mirimir wrote (06 Aug 2013 05:46:37 GMT) :
 If this exploit had included a Linux component, Tails would not have
 protected you.
 I've not studied the attack code but this appears to be mostly
 correct.

I believe it would have had to also include a local privilege
escalation exploit and tails specific code to do the bypass.

This is basically the threat model that whonix's isolation is intended
to address, it would be good to see tails improve wrt this.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-06 Thread intrigeri
Hi,

mirimir wrote (06 Aug 2013 05:46:37 GMT) :
 If this exploit had included a Linux component, Tails would not have
 protected you.

I've not studied the attack code but this appears to be mostly
correct. Our shortest-term plan to address this is to contain [1] the
web browser; this is part of the 2.0 milestone on our roadmap [2].

On the longer term, we are interested in evaluating how VM-based
approaches can be put to good use within our design goals. If you're
interested, help [3] is much welcome!

[1] https://labs.riseup.net/code/issues/5525
[2] https://labs.riseup.net/code/projects/tails/roadmap
[3] https://tails.boum.org/contribute/

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-06 Thread intrigeri
Hi,

Gregory Maxwell wrote (06 Aug 2013 06:47:03 GMT) :
 This is basically the threat model that whonix's isolation is intended
 to address, it would be good to see tails improve wrt this.

Sure. The Live environment and our wish to support not-so-powerful
hardware may get in the way, but I'm curious to see someone check what
is our actual workable margin. (Annoyingly, we depend to some degree
on whether Intel go on using the VT-x feature, or lack thereof, to
segment their stuff.)

Did I mention we need help? :)

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Is Tor still valid?

2013-08-05 Thread Andrew F
Is Tor still Valid now that we know the nsa is actively exploiting holes in
technology anonymity tools?  We know that Tor and hidden services has
issues, not to mention the whole fingerprinting problems.

Is Tor too vulnerable to trust?Watch the video below.

XKeyscore
http://www.youtube.com/watch?v=TSEbshxgUas
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-05 Thread Crypto
On 8/5/2013 1:29 PM, Andrew F wrote:
 Is Tor still Valid now that we know the nsa is actively exploiting holes in
 technology anonymity tools?  We know that Tor and hidden services has
 issues, not to mention the whole fingerprinting problems.
 
 Is Tor too vulnerable to trust?Watch the video below.
 
 XKeyscore
 http://www.youtube.com/watch?v=TSEbshxgUas
 

I'm curious as to why everyone is so intent on blaming Tor itself? Tor
was not exploited. It was a hole in FF 17 in conjunction with the
application running behind the hidden service. It's like saying My car
got a flat tire! Should I ever drive again? I agree that the exploit
was a bad one and in turn it's a big security issue. But if we're going
to point fingers let's not point at Tor. Let's focus on the underlying
issue(s) that caused this to happen. FF 17 was the target, not Tor.
Mozilla has addressed the issue. How did the exploit occur? Let's look
at the application(s) that were running behind the hidden service.

-- 
Crypto

Keywords: terrorism, bombs, jogging, suntan lotion,
nails, pellets, knives, shoes, underwear, milk, socks,
hair, toenails, masturbation, gasoline, cooking oil,
mayonnaise, bananas, Obama, Clinton, EFF, NSA, FBI,
PGP, USA, pressure cooker, marathon, fertilizer

Keywords are not necessarily in order of importance
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-05 Thread krugar
this may be a bit of a tangent to your firefox/TBB exploit question, but
it is an answer regarding the validity of TOR:

TOR is not designed to withstand global passive attackers. it tries to
select relays from different AS to create circuits that leave the area
of influence/surveillance of local passive attackers like ISPs or
(smaller) countries.

if you look at the distribution of guard and exit nodes around the globe
( https://compass.torproject.org/ ), you will notice that quite a lot of
them are positioned inside western countries, like the US, Sweden,
Germany or the UK. this means that there is a good chance for systems
that sit at the crossroads (TEMPORA comes to mind) to see all
connections that make up a tor circuit, elevating the scope of said
surveillance system from a local passive attack to a global one. whether
GCHQ and friends have figured out how to stitch TOR connections together
is another question, but they should have access to enough data to
deanonymize a large percentage of all tor traffic.

in regards to evading western surveillance, TOR seems pretty much fucked
unless there was an influx of relays in places that do not cooperate
with the western snooping systems AND that do have secure direct
sea-cables between them. if places like that even exist anymore.

cheers :S
-k

On 05.08.2013 20:53, Crypto wrote:
 On 8/5/2013 1:29 PM, Andrew F wrote:
 Is Tor still Valid now that we know the nsa is actively exploiting holes in
 technology anonymity tools?  We know that Tor and hidden services has
 issues, not to mention the whole fingerprinting problems.

 Is Tor too vulnerable to trust?Watch the video below.

 XKeyscore
 http://www.youtube.com/watch?v=TSEbshxgUas

 I'm curious as to why everyone is so intent on blaming Tor itself? Tor
 was not exploited. It was a hole in FF 17 in conjunction with the
 application running behind the hidden service. It's like saying My car
 got a flat tire! Should I ever drive again? I agree that the exploit
 was a bad one and in turn it's a big security issue. But if we're going
 to point fingers let's not point at Tor. Let's focus on the underlying
 issue(s) that caused this to happen. FF 17 was the target, not Tor.
 Mozilla has addressed the issue. How did the exploit occur? Let's look
 at the application(s) that were running behind the hidden service.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-05 Thread Markus Reichelt
* krugar tor-ad...@krugar.de wrote:

 cheers :S

I fully concur :-/

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-05 Thread andrfew
On 08/05/2013 06:53 PM, Crypto wrote:
 On 8/5/2013 1:29 PM, Andrew F wrote:
 Is Tor still Valid now that we know the nsa is actively exploiting holes in
 technology anonymity tools?  We know that Tor and hidden services has
 issues, not to mention the whole fingerprinting problems.

 Is Tor too vulnerable to trust?Watch the video below.

 XKeyscore
 http://www.youtube.com/watch?v=TSEbshxgUas

 I'm curious as to why everyone is so intent on blaming Tor itself? Tor
 was not exploited. It was a hole in FF 17 in conjunction with the
 application running behind the hidden service. It's like saying My car
 got a flat tire! Should I ever drive again? I agree that the exploit
 was a bad one and in turn it's a big security issue. But if we're going
 to point fingers let's not point at Tor. Let's focus on the underlying
 issue(s) that caused this to happen. FF 17 was the target, not Tor.
 Mozilla has addressed the issue. How did the exploit occur? Let's look
 at the application(s) that were running behind the hidden service.

That was not my focus. My concern is for known Tor venerabilities that
are documented and know by all.
If we know that Government agencies are actively and successfully
attacking soft technology targets. then how can we assume the know Tor
Venerabilities are not being exploited at this very moment.   The Tor
Venerabilities are going to be dealt with one day.. but what about right
now.  We know about them, therefore everyone knows about them.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-05 Thread adrelanos
Crypto:
 On 8/5/2013 1:29 PM, Andrew F wrote:
 Is Tor still Valid now that we know the nsa is actively
 exploiting holes in technology anonymity tools?  We know that Tor
 and hidden services has issues, not to mention the whole
 fingerprinting problems.
 
 Is Tor too vulnerable to trust?Watch the video below.
 
 XKeyscore http://www.youtube.com/watch?v=TSEbshxgUas
 
 
 I'm curious as to why everyone is so intent on blaming Tor itself?
 Tor was not exploited. It was a hole in FF 17 in conjunction with
 the application running behind the hidden service. It's like saying
 My car got a flat tire! Should I ever drive again? I agree that
 the exploit was a bad one and in turn it's a big security issue.
 But if we're going to point fingers let's not point at Tor. Let's
 focus on the underlying issue(s) that caused this to happen. FF 17
 was the target, not Tor. Mozilla has addressed the issue.

Because The Tor Project (TPO) ships the Tor Browser Bundle, which
includes Firefox.

TPO is being blamed for leaving javascript enabled by default. And for
not shipping a hardened text-only browser. And for not shipping the
most secure operating system (yet to be implemented).

On the other hand, if TPO focused on security in past at cost of
usability, the people complaining know maybe wouldn't even know that
Tor existed.

See this attack as an reminder and reality check. Tor is not as safe
as many people kept preaching. We need safer anonymity networks, safer
operating systems, more educated users and probably a lot more stuff.
To make it happen, it needs your contribution and/or your money.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-05 Thread andrfew
Adrelanos,
Would the exploit have worked with Whonix?

On 08/05/2013 10:30 PM, adrelanos wrote:
 Crypto:
 On 8/5/2013 1:29 PM, Andrew F wrote:
 Is Tor still Valid now that we know the nsa is actively
 exploiting holes in technology anonymity tools?  We know that Tor
 and hidden services has issues, not to mention the whole
 fingerprinting problems.

 Is Tor too vulnerable to trust?Watch the video below.

 XKeyscore http://www.youtube.com/watch?v=TSEbshxgUas

 I'm curious as to why everyone is so intent on blaming Tor itself?
 Tor was not exploited. It was a hole in FF 17 in conjunction with
 the application running behind the hidden service. It's like saying
 My car got a flat tire! Should I ever drive again? I agree that
 the exploit was a bad one and in turn it's a big security issue.
 But if we're going to point fingers let's not point at Tor. Let's
 focus on the underlying issue(s) that caused this to happen. FF 17
 was the target, not Tor. Mozilla has addressed the issue.
 Because The Tor Project (TPO) ships the Tor Browser Bundle, which
 includes Firefox.

 TPO is being blamed for leaving javascript enabled by default. And for
 not shipping a hardened text-only browser. And for not shipping the
 most secure operating system (yet to be implemented).

 On the other hand, if TPO focused on security in past at cost of
 usability, the people complaining know maybe wouldn't even know that
 Tor existed.

 See this attack as an reminder and reality check. Tor is not as safe
 as many people kept preaching. We need safer anonymity networks, safer
 operating systems, more educated users and probably a lot more stuff.
 To make it happen, it needs your contribution and/or your money.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is Tor still valid?

2013-08-05 Thread adrelanos
andrfew:
 Adrelanos,
 Would the exploit have worked with Whonix?

For a discussion of this, please have a look at our forum:

https://whonix.org/wiki/Special:AWCforum/st/id50/Latest_javascript_exploit_againshtml

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk