Comment by bragr

Comment by bragr a day ago

69 replies

>This could cost less than $5000 for a month

I ran a bunch of nodes for a couple years and that's optimistic by perhaps an order of magnitude. No $5 a month VPS provides enough bandwidth to sustain the monthly traffic of a Tor node, and nodes need to be continuously online and serving traffic for about 2-3 months[1] before they will be promoted to guard relays. Throttling traffic to stay in your bandwidth allocation will just get you marked as a slow node and limit the number of connections you get. Sustaining just 1 Mbps will blow your monthly transfer allocation on the cheap tiers of both Digital Ocean or Linode.

[1] https://blog.torproject.org/lifecycle-of-a-new-relay/

belorn a day ago

Now to add additional problems. 1000 tor nodes on a single platform would be very noticeable and geographically limited. Platforms also have different weight attached to them in the consensus, which adds further time requirements before a node is promoted. The developers do not want a single platform provider to be able to observe a large portion of all the traffic, so there are counter measures.

The attacker could try to create a handful of accounts on hundreds of platforms in as many countries as possible, assuming one verify that the platforms accepts tor and do not share underlying providers and data centers. The cost would then be the average price of said providers, which is going to be a fair bit more than the cheapest providers out there. Managing and spreading them out is also going to cost a lot of man hours. Also the secops need to be fairly on the point and need to be maintained quite strictly across all the providers.

  • qb1 16 hours ago

    Pagers and the next day handheld radios exploded on their users! This can be done.

    • aesh2Xa1 16 hours ago

      I think the news about that particular counter example is too recent to be easily understood.

      https://www.schneier.com/blog/archives/2024/09/remotely-expl...

      Still, I think your point is excellent. The sort of group interested in tracking someone(s) over Tor certainly might have the capability to do so despite the difficulty.

      • maicro 15 hours ago

        Yeah, too recent to understand (though I've also been out of the loop a bit) - so thank you, that's...a good one.

    • hiatus 14 hours ago

      > Let's say I as a private individual fund 1000 tor nodes

      Was the operation against Hezbollah funded by a private individual? Otherwise I'm not sure the relevance of your statement to the comment that started this thread.

  • ranger_danger 15 hours ago

    Considering multiple world governments have already shown in leaked documents that this is exactly what they do, I personally wouldn't trust my secrets with tor.

    • halJordan 9 hours ago

      But and God forbid you read TFA, those leaked techniques were all done before the latest mitigations that the Tor Project is writing the blog about.

  • [removed] 11 hours ago
    [deleted]
voldacar a day ago

I started a tor relay on a spare vps about a month ago and it got guard status around 2-3 weeks in, so that info seems to be out of date.

  • arktos_ a day ago

    Pardon my ignorance, but I thought it fruitful to ask: Are there any issues that can arise by doing this on a VPS?

    I ask because I know of stories of law enforcement sending inquiries to owners of, say, exit nodes requiring certain information about given traffic. I don't know if this happens for middle-nodes (or whatever they're called).

    Moreover, are there any issues with associating a node to, you know, your name and billing information?

    I don't know much about this, and although I could look it up, I think that my questions - and your respective answers or those of others - might do some public service of information sharing here.

    • GTP a day ago

      I never operated a TOR node, but as far as I know and heard from other sources, TOR realays don't get much attention from law enforcement, it any attention at all. Which makes sense: all they're doing is getting encrypted traffic in and giving encrypted traffic out. It would hard for them to link a relay node to a specific connection, and even if they do, you can't help them in any way: even you as the node operator are only able to see encrypted traffic.

      Edit: there's a youtuber called "Mental Outlaw" that published a while ago some videos about setting up and operating TOR nodes. He sometimes gives inaccurate information regarding more theoretical topics, so I don't follow him much. But I think he can be trusted for this practical topics.

      • WHA8m 16 hours ago

        Just a quick note on the Youtube channel you mention: I follow his videos for a while and it seems to me, that he's half a shill. My impression is, that he re-models popular HN threads into Youtube videos. Just watch the latest video on the MrBeast topic and you'll basically get the same info as all the popular 'root' comments (was on HN front page last week). Not the first time I noticed a suspicious connection.

    • INTPenis 16 hours ago

      I ran tor exit nodes on Linode and Digitalocean for years. No real issues, but you will get regular abuse complaints.

      The support teams always understood once I explained it was a tor exit node. I co-operated with the Cloud provider and added any IP-address that requested it to my list of exempt addresses.

      • ranger_danger 15 hours ago

        > The support teams always understood

        But they don't have to. It could also be against their ToS, and many other providers would not have been ok with it. Accounts and domains have been taken away for much less.

    • dunghill 17 hours ago

      There was a recent HN topic where person running exit nodes run into quite a lot of issues because of it.

    • voldacar a day ago

      I'm not an exit node.

      You can buy a vps with xmr if you're worried about privacy from law enforcement.

      • Imustaskforhelp a day ago

        most vps don't support xmr though. any suggestions to whom I can trust (I basically only trust hetzner in vps space)

    • immibis 21 hours ago

      Non-exit nodes are generally considered safe to run. it's only exit nodes that system enforcement keeps trying to shut down.

teaearlgraycold a day ago

Still easily within the budget of the US, Russia, China, Israel, etc. I wouldn't be surprised if a majority of nodes are ran by intelligence agencies.

  • andai a day ago

    They say the internet is just someone else's computer. With Tor it's the computer of a person who wants you to think it's not their computer, and also that they aren't paying attention to (or somehow can't see) what you're doing on it.

  • giantg2 a day ago

    The interesting thing is, the more agencies that run relays, the more they interfere with each other. So having something like US, Russia, and China a each running 25% of the network reduces the chances of any one getting all three relays.

  • bawolff a day ago

    I think the threat model is that the majority are not run by cooperating malicious parties.

    Russia, china and usa all dont like each other much so are probably not sharing notes (in theory).

    • aftbit a day ago

      Or perhaps they _are_ sharing notes about tor users with each other, as part of a global club of intelligence agencies (a sort of new world order) who would rather not be overthrown. How are we to know?

      • anticorporate a day ago

        Because if they each only have incomplete information, they each wouldn't know whether the information they have is relevant to preventing overthrow of their collective order, or intelligence that is only going to help their geopolitical adversary.

        Basically, a variation of the prisoner's dilemma.

        Also, those nukes we have pointed at each other are a pretty healthy hint.

      • jrochkind1 14 hours ago

        Or perhaps someone with secret quantum computing can break all our encryption and has full transparency on all communications on the internet. Perhaps extraterrestrials are eavesdropping on everything I say in my living room, and sharing it with the KGB. How are we to know?

      • rrrix1 12 hours ago

        Occam's Razor definitely applies here.

        "The simplest explanation is usually the best one."

        Conspiracy theories are a logical reasoning black hole.

        I personally feel it's generally best to avoid the mental Spaghettification.

  • chr_1 a day ago

    Before 2020 when /r/privacy stimulated conversation that was worthy of good discussion you learned Tor the software made less available nodes accessible with newer deployments, that’s why it got faster. Regardless of how many nodes existed. The routing shifted. Now it’s way faster and there's specifically designated guard nodes seemingly pinged repeatedly out to the same allied nations.

  • darby_nine a day ago

    In fact, you should assume they are. This doesn't imply the network doesn't have utility for a given actor.

[removed] 16 hours ago
[deleted]
chatmasta a day ago

You don’t technically need separate nodes, just separate IP addresses. Although Tor has some marginal protections against circuits sharing relays with similar IP, so you couldn’t just get a /24 and hope they all get the same circuit.

  • tga_d a day ago

    Not only would you need the node to expose IPs with a wide enough distribution to allow the right path selection, you'd also need to have enough bandwidth available to look like distinct hosts, and ensure any losses in connectivity aren't correlated enough to draw attention (people monitor metrics.torproject.org pretty diligently, and would notice if there was a chunk of bandwidth coming and going in lockstep). At that point, the difference in cost to just actually running legitimately separate hosts is negligible. All empirical evidence points towards the status quo that has existed for most all of Tor's existence: if you want to identify Tor users, there are cheaper ways to do it than dominating the network (and those ways are expensive enough to be outside most people's threat models).

    That said, any bandwidth anyone wants to contribute to mitigate such attacks is always appreciated, even if it's more useful for performance reasons in practice. ;)

zorrn 9 hours ago

We also recently saw the xz backdoor wich was worked on for many years so I think it could be possible if you really have on target.

alfiedotwtf a day ago

If it’s that expensive to run Tor nodes, who is actually paying for them? I’ve heard individuals getting doors kicked in for participating in the network, so it’s not individuals. Corporates too wouldn’t want this type of burden… so is it really just spy-vs-spy

  • p4bl0 a day ago

    Many individuals contribute to running relays. And there are non-profit organizations collecting donations to operates Tor exit nodes:

    - https://www.torservers.net/

    - https://nos-oignons.net/

    • idiotsecant 10 hours ago

      This is probably strictly true but it smacks to me of 'many people say'. I wonder what % of TOR nodes are run by people with an ideological allegiance for the network vs how many are run by nation-state actors.

  • akimbostrawman a day ago

    only exit nodes get there door kicked in and they are the minority and not needed for the tor network to function

    • zerd 11 hours ago

      They are pretty essential, without them you can only access onion services.

  • 0points a day ago

    > I’ve heard individuals getting doors kicked in for participating in the network, so it’s not individuals.

    It's individuals

    • autoexec 12 hours ago

      Unless something has changed, one of the issues with Tor is that it tries to send traffic through servers that have the most bandwidth which are pretty much certain to be servers owned by the state a lot of the time because a random person's residential cable modem is going to be a lot less capable.

      • input_sh 11 hours ago

        Run by individuals doesn't necessarily mean run on potato hardware. I ran a highly reputable (non-exit) node on a beefy but underutilised dedicated server for at least half a decade.

  • immibis 21 hours ago

    I run a non-exit node any time I have the spare resources. I2P too. This means they're on the same popular providers that have too many other nodes, though.

    Sometimes I set it up as a bridge (hidden entry node) instead.

[removed] 9 hours ago
[deleted]
ForHackernews 19 hours ago

These costs explain why most of the nodes are probably run by the FBI.