TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Law Enforcement Undermines Tor

105 pointsby pantalaimon7 months ago

11 comments

dang7 months ago
Recent, related, and cited:<p><i>Is Tor still safe to use?</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41583847">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41583847</a> - Sept 2024 (562 comments)
cedws7 months ago
I have suspected Tor has been busted for quite a long time. LE is only using this power selectively for now - the last thing that they want is to scare users away lest they go and build something more secure.<p>The Nym mixnet[0] seems promising but it&#x27;s still new and unproven.<p>I had an idea a while back to make traffic analysis more difficult by building circuits distributed across adversarial countries. Would like to hear thoughts on it.[1]<p>[0]: <a href="https:&#x2F;&#x2F;nymtech.net&#x2F;about&#x2F;mixnet" rel="nofollow">https:&#x2F;&#x2F;nymtech.net&#x2F;about&#x2F;mixnet</a><p>[1]: <a href="https:&#x2F;&#x2F;cedwards.xyz&#x2F;adversarial-routing&#x2F;" rel="nofollow">https:&#x2F;&#x2F;cedwards.xyz&#x2F;adversarial-routing&#x2F;</a>
评论 #41952370 未加载
评论 #41944795 未加载
评论 #41944403 未加载
j-bos7 months ago
One advantage of imperfect privacy solutions like Tor is they force authorities to invest if they want to snoop. In the before times if soneone wanted to read your mail they&#x27;d need to at least convince a judge and then spend manpower interecepting the envelopes, today they can just ping google for a bcc.
评论 #41944672 未加载
rustcleaner7 months ago
The dark network of the future will be an onion-routed Hyphanet&#x2F;Freenet, with monthly &quot;bandwidth quotas&quot; that make links communicate uniformly at X GB&#x2F;hr regardless of traffic (padding when there is none) until the monthly quota is hit right at the end of the month. If internodal links don&#x27;t vary in externally measurable ways when utilized, netflow is diminished.
评论 #41944386 未加载
评论 #41944423 未加载
sandworm1017 months ago
Time for nodes to inject some random traffic. It sounds like if even 0.1% was random fluff they would not be able to track packets between nodes.
评论 #41944348 未加载
jagged-chisel7 months ago
Is there something new here? I’m under the impression that we knew this kind of thing was possible with enough resources.
评论 #41944327 未加载
评论 #41944383 未加载
评论 #41944251 未加载
评论 #41944765 未加载
dialup_sounds7 months ago
It&#x27;s not directly mentioned in this article, but the four deanonymized users were admins of a CSAM site with hundreds of thousands of users. If you&#x27;re concerned about being targeted by law enforcement, step one is probably: don&#x27;t be that.<p><a href="https:&#x2F;&#x2F;www.dw.com&#x2F;de&#x2F;darknet-missbrauchsplattform-boystown-zerschlagen&#x2F;a-57416124" rel="nofollow">https:&#x2F;&#x2F;www.dw.com&#x2F;de&#x2F;darknet-missbrauchsplattform-boystown-...</a><p><a href="https:&#x2F;&#x2F;www.sueddeutsche.de&#x2F;panorama&#x2F;kindesmissbrauch-boystown-darknet-frankfurt-prozess-1.5710224" rel="nofollow">https:&#x2F;&#x2F;www.sueddeutsche.de&#x2F;panorama&#x2F;kindesmissbrauch-boysto...</a>
评论 #41944962 未加载
评论 #41947039 未加载
bananamango7 months ago
Split EntryGuard should help, means you connect to multiple of them instead of one, and your data is split between them then it gets to Exit through multiple paths (Middle Nodes) and there it is reconstructed to one data stream. How about that?
bananamango7 months ago
Connecting through multiple EntryGuards should help in this situation, Tor should split data transfer to many smaller ones travelling through different paths (Entry+Midddle) and then get it reconstructed to one stream at ExitNode.
ementally7 months ago
Are there any projects that generates random traffic? Like a website where you have it open it keeps sending <i>random</i> traffic. It will make traffic analysis very hard.
评论 #41947443 未加载
评论 #41944822 未加载
评论 #41944682 未加载
评论 #41944756 未加载
评论 #41944925 未加载
radku7 months ago
Would using VPN prevent prying eyes from detecting the IP address? This issue seems to be related only to Tor users who do not use VPN?
评论 #41947132 未加载