Comment by dumbo-octopus

Comment by dumbo-octopus a day ago

14 replies

You don’t need all the middle nodes. Just the entry and exit, and enough data to do packet timing analysis to correlate them. It’s in fact shockingly easy for a well provisioned actor to trace tor traffic, and this is something the TOR project openly admits.

They’re financed by the US Government after all…

alphan0n a day ago

Onion sites do not utilize an exit node.

  • dumbo-octopus a day ago

    There is a node that delivers your packet to the target server, is there not?

    • alphan0n a day ago

      If the server is on the Tor network, an onion server, then it is encrypted end to end and no traffic or identity is exposed to either the onion server or any intermediary.

      That is to say, if I started an onion server on one side of the world, then connected to it from somewhere else, my connection to it would be anonymous and encrypted to any external entity.

      • [removed] a day ago
        [deleted]
      • dumbo-octopus a day ago

        How are you imagining the penultimate node in the chain connects to the target server without knowing anything about them?

basedrum a day ago

Tor does have padding defenses to protect against that.

Also, according to their latest blog post on their finances, while it is true they have money from the US Government, that was only ~50% of their income (I think that was 2023). For the FUD part of that comment, see the "U.S. Government Support" section of https://blog.torproject.org/transparency-openness-and-our-20...

  • dumbo-octopus a day ago

    “Only half” is hilarious. Thanks for that.

    And if you trust the NSA can’t overcome correlation in the presence of “padding defenses”, then sure: TOR is secure.

    • 867-5309 18 hours ago

      I wonder how many tor users actually know this. tor would probably not exist in the same capacity without that funding