TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hackers build a new Tor client designed to beat the NSA

220 pointsby nssheyabout 10 years ago

11 comments

otoburbabout 10 years ago
&gt;&gt;Astoria [is] both most effective and most usable when at its highest security level, the researchers say, so &quot;Astoria is a usable substitute for the vanilla Tor client only in scenarios where security is a high priority.&quot;<p>I&#x27;m still working through the research paper[1] linked at the end of the article, but if Astoria is as good as described, wouldn&#x27;t Tor either adopt the same node selection policies, or people shift over to Astoria wholesale?<p>[1] <a href="http:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;1505.05173.pdf" rel="nofollow">http:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;1505.05173.pdf</a><p>EDIT: From the paper, quotes below provide much clearer context for the quote in the article:<p>&quot;From our evaluation of Astoria, it is clear that the performance-security trade-off is favorable only in its higher security configurations. [...] However, at lower security configurations, the performance offered by Tor is clearly better, and its security, only slightly worse. Therefore, Astoria is a usable substitute for the vanilla Tor client only in scenarios where security is a high priority.&quot;
评论 #9586375 未加载
评论 #9586289 未加载
throwaway7767about 10 years ago
I&#x27;m not done reading the paper, but I suspect that astoria clients could be distinguished from regular tor clients at least by the fact that they do not pre-build circuits.<p>This means that the anonymity set has been partitioned, especially given that the authors say &quot;From our evaluation of Astoria, it is clear that the performance-security trade-off is favorable only in its higher security configurations.&quot;<p>So there is a danger that people who perceive themselves to need higher security and use this client will lose anonymity guarantees as they are mixing with a much smaller group of people who all consider themselves &quot;interesting targets&quot;.<p>The big reason tor is so effective is because they&#x27;ve performed a lot of outreach and gotten different groups to use it, resulting in a large and heterogenous set of users.<p>Of course, this is still very interesting research, and maybe it will be integrated into the official tor client. I know there have been many discussions of AS-path-based selection in the past.
late2partabout 10 years ago
&quot;designed to beat&quot; means better, not perfect. Imperfect means eventually it gets beat. The NSA might say what the IRA told Margaret Thatcher, &quot;Today we were unlucky, but remember we only have to be lucky once. You will have to be lucky always.&quot;
评论 #9588762 未加载
评论 #9586453 未加载
评论 #9586727 未加载
评论 #9587103 未加载
maljxabout 10 years ago
Isn&#x27;t the classical solution to this encryption problem to always send packages in the same size at regular intervals. If each host adds a layer of encryption you can&#x27;t match the packages at the end points. Is this just too expensive? (I&#x27;m not an expert so genuine question from my naive POV.)
评论 #9589268 未加载
评论 #9590792 未加载
评论 #9590091 未加载
white-flameabout 10 years ago
I really wish more people and companies would host things on Tor&#x27;s hidden services, avoiding the entire notion of exit nodes and the cleartext network.
评论 #9588166 未加载
digitalchaosabout 10 years ago
&gt;&gt; Astoria also opens multiple avenues for future work such as integrating realtime hijack and interception detection systems (to fully counter RAPTOR [18] attacks)<p>This is really interesting. I&#x27;m curious how that would work.
kipropingabout 10 years ago
I tend to prefer links from the actual researchers if available other than links from news sites. Just a general observation.
评论 #9587692 未加载
ZainRizabout 10 years ago
&quot;Astoria reduces the number of vulnerable circuits from 58 percent to 5.8 percent, the researchers say&quot;<p>Yes, their researched showed that exactly 5.8% circuits would be vulnerable with their change, and measured it accurately to 0.1%.<p>The research did not say that vulnerability would be around 10% of the original amount +&#x2F;- 5%
ape4about 10 years ago
Maybe this isn&#x27;t a new idea. But it seems that more Tor exit points would be a big help. Has anyone made a tool that&#x27;s both and entry and exit point. You could control the amount of bandwidth exiting. This way the exit points would be more transient - like Bittorrent peers.
评论 #9587222 未加载
pakled_engineerabout 10 years ago
The problem is getting Tor itself as per Snowden docs they capture your identifiers for later surveillance so need to Jason Bourne around the city to anonymously fetch Tor.
FatalBaboonabout 10 years ago
The header picture looks terrific, very webby