I'm not understanding this. If I use the "Tor Browser Bundle" and never use that browser for anything but Tor, and never log in to anything on that browser, how can they track me?
Tor is not resilient against timing correlation attacks.
Suppose Alfred hosts a Tor onion describing relativistic physics.
Suppose Bob cautiously uses Tor to consult such information on a regular basis.
Then depending on priviliged access or leverage on the internet backbone multiple approaches can be used:
A) suppose some regions randomly suffer internet or power black-outs. Obviously a Tor onion interacting with the Tor network is not in that region. While a Tor onion disconnected for the duration of such an event is possibly/probably in one of such regions. Similar for tor Browsers.
B) instead of waiting for spontaneous events they can be elicited (costly in case of internet blackouts, very costly in case of energy blackouts).
C) instead of disabling participation, one can randomly stall it: if ISP's at both ends co-operate or are compromised, network packets can be intentionally given known pseudorandom delays on top of the spontaneous delays. By calculating the correlation of the delays one can identify which Tor user IP address is frequenting which Tor onion host IP address. This works even if the added delays are smaller than the spontaneous delays, because the spontaneous delays are uncorrelated with the injected delays so the "correlation" of the spontaneous delays with the injected delays will average towards 0, whereas the correlation factor of injected delays will correlate with the injected delays. The number of packets necessary to have true positives raise above the noise floor depends on the relative sizes of the spontaneous variation in delays and the injected delays. If the injection delays are smaller it will take many more packets before true positives rise above the noise floor.
This article is from the time of the Snowden leaks, more than 10 years ago.
The moment they have correlated the traffic on your ISP's end, with the traffic on the specific Tor onion's ISP's end, they can just ask your ISP for your true name.
In this case the experts were convinced cookies were used, which is conceivably correct for a fraction of the users. The cookies and ads were probably multifunctionally abused: tracking random browsing, spam email for lucky hits, propagation delay injection of the advertisement packets, ...
Something I have been meaning to write up for a long time but never got around to:
I assume the reader knows the basics of asymmetric cryptography, for sake of brevity and simplicity lets us consider RSA, even though thats not the onion encryption in Tor uses. I assume the reader is familiar with the mathematics behind RSA, and the basic proofs that decrypting the encrypted number results in the original number, so familiarity with modular arithmetic, modular exponentiation etc is assumed...
I assume the reader knows the basic concept of onion routing: the sender of a packet chooses an arbitrary path through routing nodes, whose public keys are known, and first encrypts the packet for the exit node's public key, then encrypts that for the next-to-last nodes public key, and so on in a backwards fashion to finally encrypt the onion packet for the first routing node's public key. At each layer a bit of metadata is encrypted along so the routing nodes know only the next node to send their decryption to. So the N-layer encrypted packet is sent to the first routing node, which decrypts the first layer, splits the metadata from the N-1-times encrypted packet, and sends the latter to the next node mentioned in the metadata.
From the perspective of an ISP or 3 letter agency monitoring the traffic of a specific intermediate routing node, they see encrypted packets arrive, and encrypted packets leaving.
Let me first state the obvious, but which I will NOT rely on:
If the eavesdropper were to possess the capability to break RSA, they could trivially decrypt the packet and associate the incoming packets to the outgoing packets. (let us ignore that if they could break RSA, they could just decrypt the whole layered onion of the packet at once...).
given "A => B" and "not A" one is unable to prove "not B", although it is tempting to jump to that conclusion. B can be true while A is false, it would just mean that the eavesdropper could track packets in an alternative manner, but how?
Lets go back to our hypothetical naive RSA implementation of Tor:
Is it really necessary to break RSA to match incoming and outgoing packets of an intermediate node?
Of course not: imagine first for simplicity that the node only received 2 incoming packets, and 2 outgoing packets.
This means the eavesdropper sees 2 incoming k+1 times encrypted packets, and 2 k-times encrypted packets, which happen to be the decryption of the incomming packets. Why break RSA if the outgoing packets ARE the decryptions? One merely needs to re-encrypt the outgoing packets with the proper metadata, given the routing node's public key, and one should end up with identically one of the 2 incoming packets, so consolidating ISP powers, or other attackers able to monitor network traffic on a sufficient number of nodes can simply track packets in the onion network. Effectively the k+1-times encrypted packet is an RSA signature of the k-times encrypted packet!!!
Suppose a random route is 5 hops long and that there are 30 routing nodes (not realistic but insightful as we will see).
Suppose only the entry node packet and the exit node packet are logged, but not the intermediate traffic. How computationally expensive would it be to guess and verify the route?
that would be 30 times 29 times 28 times 27 times 26 combinations. Each combination would consist of 5 encryptions/signature checks. Very feasible to brute force.
The reason this is insightful is that a dominant eavesdropped missing observability on a small number of links can brute force these without having to break RSA, and still verifiably confirm the actual route. It would only need to consider public keys of nodes on which observability it lacks. So this becomes expensive much quicker for entities that have less eavesdropping infrastructure, than for dominant eavesdroppers.
A security researcher who understands this potential ploy in onion routing networks will have a hard time proving the exploit in practice, because the researcher lacks the eavesdropping powers that ISP's and 3 letter agencies possess.
because their target are not nerds using tor to access their own machines or random 4ch clones.
they target politicians, whistleblowers and journalists.
if you ever volunteered to organizations helping those you quickly Learn that group is not very tech literate, have cheap limited devices, skips instructions.
I’m not aware of any sandbox escape attack for the Tor browser, but I am no expert. If there is one, even limited, it’d probably be enough to figure out a way to track you down.
The only way to anonymize it enough, also defeating any attempt at cookie/malware injection to me would be to create a VM with the strict necessary to run Tor browser and clone it for single use, that is, a script that clones the VM, opens it, let you use Tor browser, then as you close the browser the VM is also closed and deleted. The script could also create the next VM changing bits here and there for added anonymization (OS and browser signature, screen and window size, mouse settings, etc) while the old one is still running, to save time.
> "The NSA then cookies that ad, so that every time you go to a site, the cookie identifies you. Even though your IP address changed [because of Tor], the cookies gave you away," he said.
In other words, just using tails will solve this issue because every session gives you a clean environment.
“The NSA buys ads from ad display companies like Google and seeds them around Tor's access points.”
"On the off chance that [the spam recipient] renders the HTML or clicks a link, [the NSA] can connect your e-mail address to your browser," he explained, which the NSA would have already connected to an IP address. "Using Tor or any proxy wouldn't prevent it."
Install a cookie autodelete extension. That will let you whitelist cookies you want for persistent logins and discard the rest. They can usually be configured to purge on tab closing.
Autodelete is old tech if you ask me. If you open the sites before the autodelete happens, then the tracking still happens. Temporary Containers is an addon that solves this elegantly.
I use Firefox with Temporary Containers. Each tab is a brand new context automatically. Tabs don't talk to each other, each of them is separate - although, if you want, you can open a new tab in the same context, and even make permanent contexts. Closed tabs' contexts get purged after some minutes.
I've opted to just incognito the majority of my browsing. Likewise it's annoying to keep logging in and sometimes I wish I had something from my history. On the other hand, I never have to worry about cookies
Except even incognito persists and shares cookies across all incognito sessions for as long as at least one incognito window is open. Cookies will not be erased until you close every window.
Firefox has an old slightly broken feature that wipes all cookies, except from a set of origins you whitelist. It actually saved me about half a gigabyte of pure cookie nonsense and made website loading quite a bit faster. Soon after I set it up, they announced their third-party cookie sandboxing, but I still think there's no reason to keep all the adtech trash on your computer in any capacity.
about:preferences -> Privacy & Security -> Cookies and Site Data -> [x] Delete cookies and site data when Firefox is closed -> Manage Exceptions
Just don't forget to back up your `~/.mozilla/firefox/*.default-release/cookies.sqlite*` beforehand.
Imagine the world without internet ads. Journalism wouldn't be a click bait race to the bottom, news would still be relatively unbiased, and the nsa would have one less massive vector to track you with.
I'm honestly just waiting for people to realise that online ads are the root cause of most of the things people complain about.
Fake news? Check
Surveillance state? Check
Screen addiction? Check
Lack of nuance in any debate? Check
Unsavoury geopolitical influence? Check
The advertising industry somehow manage to stay relevant, despite the fact that their business is literally the same as the dictionary definition of brain washing.
You can even imagine an alternate reality where the central ad serving entity emerged as pull-based instead of push-based.
Ads can, in theory, serve a useful purpose, informing individuals of products and services which would legitimately make their lives better (e.g., I bought a low-end immersion blender a year or two ago, didn't know they existed too far beforehand, and am quite happy with the ease/safety improvements over any other blending strategy I used to have, especially for bulk and/or hot liquids, especially compared to what I paid and how much space it takes, but without _some_ kind of ad I might never have known about the product (not a perfect example, since I learned about them from a friend, but hypothetically)).
The push-based ad ecosystem has a tacit assumption that people don't want the products and services being sold. That's a mostly true assumption, but instead of the solution being filtering to better products, well-vetted products, avoiding added-cost-without-added-benefit lookalike products, not advertising outright frauds, ..., the industry has opted for more invasive ways of forcing us to watch things we won't ever care about and siphoning invasive tax/healthcare/... information to slightly reduce the miss-rate in ad serving.
That's probably inevitable without regulation (it's cheaper to bully people into watching ads than to improve your ad inventory, with the side benefit that as an ad network you profit when suckers fall for the frauds too, plus it's easier to charge the company making money instead of the end consumer, so a profit-focused company will naturally swim that direction). As an alternative business model though, imagine great search tools on top of a pool of better ad inventory, where you could choose the demographic info and interests you wanted to be considered for a particular search session instead of having that inferred from your browsing history and the raw copies of your paystubs your employer is likely selling.
The root cause? You've missed the giant elephant that's standing right there in the room. It's strange how the elephant managed to make itself invisible. I agree the elephant shit is really bad and really stinks, we should do something about the shit, but we should also do something about the elephant.
Sure. But it's also an Internet without a lot of the web sites people enjoy.
If it ends the "brainwashing" it would be because people would not be on the Internet at all. And maybe that's a net good for the world. But here are you and me, on a web site that is itself basically an advertisement for a VC firm.
There's an even deeper foundation to this problem: copyright.
Artists must get paid, or they will either starve or stop making art.
This is the fundamental threat we have structured our entire civilization around. Art must be labor. Labor must have monetary value. Without income, people must starve and die.
To support this system, we have the most untenable law of the digital age: copyright. The most trivial act, to copy data, shall be monopolized.
But copyright didn't stop there. It grew. We use it to censor. We use it to moderate. We use it to end fraud. We use it to prevent libel. We use it to guarantee collaboration of work. Copyright has become the swiss army knife of law.
Ads literally dictate what you see online. They don't create the desire for power and influence, but they do create the structure for achieving power and influence.
But ads are an inevitable effect, no matter if they are online or "offline", except if you think that ads should be prohibited which would turn to a different discussion.
Oh, we're in that discussion. I have yet to see a valid argument for advertising of any sort that outweighs the negatives that the industry currently displays.
We're well beyond the arguments for the recommendation graphs and the open market. Adtech, as it's currently practiced, is basically rage farming in disguise.
Suppose Alfred hosts a Tor onion describing relativistic physics.
Suppose Bob cautiously uses Tor to consult such information on a regular basis.
Then depending on priviliged access or leverage on the internet backbone multiple approaches can be used:
A) suppose some regions randomly suffer internet or power black-outs. Obviously a Tor onion interacting with the Tor network is not in that region. While a Tor onion disconnected for the duration of such an event is possibly/probably in one of such regions. Similar for tor Browsers.
B) instead of waiting for spontaneous events they can be elicited (costly in case of internet blackouts, very costly in case of energy blackouts).
C) instead of disabling participation, one can randomly stall it: if ISP's at both ends co-operate or are compromised, network packets can be intentionally given known pseudorandom delays on top of the spontaneous delays. By calculating the correlation of the delays one can identify which Tor user IP address is frequenting which Tor onion host IP address. This works even if the added delays are smaller than the spontaneous delays, because the spontaneous delays are uncorrelated with the injected delays so the "correlation" of the spontaneous delays with the injected delays will average towards 0, whereas the correlation factor of injected delays will correlate with the injected delays. The number of packets necessary to have true positives raise above the noise floor depends on the relative sizes of the spontaneous variation in delays and the injected delays. If the injection delays are smaller it will take many more packets before true positives rise above the noise floor.
This article is from the time of the Snowden leaks, more than 10 years ago.
The moment they have correlated the traffic on your ISP's end, with the traffic on the specific Tor onion's ISP's end, they can just ask your ISP for your true name.
In this case the experts were convinced cookies were used, which is conceivably correct for a fraction of the users. The cookies and ads were probably multifunctionally abused: tracking random browsing, spam email for lucky hits, propagation delay injection of the advertisement packets, ...
I assume the reader knows the basics of asymmetric cryptography, for sake of brevity and simplicity lets us consider RSA, even though thats not the onion encryption in Tor uses. I assume the reader is familiar with the mathematics behind RSA, and the basic proofs that decrypting the encrypted number results in the original number, so familiarity with modular arithmetic, modular exponentiation etc is assumed...
I assume the reader knows the basic concept of onion routing: the sender of a packet chooses an arbitrary path through routing nodes, whose public keys are known, and first encrypts the packet for the exit node's public key, then encrypts that for the next-to-last nodes public key, and so on in a backwards fashion to finally encrypt the onion packet for the first routing node's public key. At each layer a bit of metadata is encrypted along so the routing nodes know only the next node to send their decryption to. So the N-layer encrypted packet is sent to the first routing node, which decrypts the first layer, splits the metadata from the N-1-times encrypted packet, and sends the latter to the next node mentioned in the metadata.
From the perspective of an ISP or 3 letter agency monitoring the traffic of a specific intermediate routing node, they see encrypted packets arrive, and encrypted packets leaving.
Let me first state the obvious, but which I will NOT rely on:
If the eavesdropper were to possess the capability to break RSA, they could trivially decrypt the packet and associate the incoming packets to the outgoing packets. (let us ignore that if they could break RSA, they could just decrypt the whole layered onion of the packet at once...).
To transliterate to math:
EavesDropperAbleToBreakRSA => EavesDropperAbleToTrackPackets
given "A => B" and "not A" one is unable to prove "not B", although it is tempting to jump to that conclusion. B can be true while A is false, it would just mean that the eavesdropper could track packets in an alternative manner, but how?
Lets go back to our hypothetical naive RSA implementation of Tor:
Is it really necessary to break RSA to match incoming and outgoing packets of an intermediate node?
Of course not: imagine first for simplicity that the node only received 2 incoming packets, and 2 outgoing packets.
This means the eavesdropper sees 2 incoming k+1 times encrypted packets, and 2 k-times encrypted packets, which happen to be the decryption of the incomming packets. Why break RSA if the outgoing packets ARE the decryptions? One merely needs to re-encrypt the outgoing packets with the proper metadata, given the routing node's public key, and one should end up with identically one of the 2 incoming packets, so consolidating ISP powers, or other attackers able to monitor network traffic on a sufficient number of nodes can simply track packets in the onion network. Effectively the k+1-times encrypted packet is an RSA signature of the k-times encrypted packet!!!
Suppose a random route is 5 hops long and that there are 30 routing nodes (not realistic but insightful as we will see).
Suppose only the entry node packet and the exit node packet are logged, but not the intermediate traffic. How computationally expensive would it be to guess and verify the route?
that would be 30 times 29 times 28 times 27 times 26 combinations. Each combination would consist of 5 encryptions/signature checks. Very feasible to brute force.
The reason this is insightful is that a dominant eavesdropped missing observability on a small number of links can brute force these without having to break RSA, and still verifiably confirm the actual route. It would only need to consider public keys of nodes on which observability it lacks. So this becomes expensive much quicker for entities that have less eavesdropping infrastructure, than for dominant eavesdroppers.
A security researcher who understands this potential ploy in onion routing networks will have a hard time proving the exploit in practice, because the researcher lacks the eavesdropping powers that ISP's and 3 letter agencies possess.
they target politicians, whistleblowers and journalists.
if you ever volunteered to organizations helping those you quickly Learn that group is not very tech literate, have cheap limited devices, skips instructions.
https://en.m.wikipedia.org/wiki/Tor_(network)#EgotisticalGir...
You don’t have to login to be given a cookie that’s then stored and tracked across each new IP that Tor cycles through.
https://support.torproject.org/glossary/cookie/
Google has programs where they can identify budding extremists and correlate behavior to medical diagnoses without HIPAA exposure.
If your secret weird shit that you’re doing with Tor is of interest, they’ll eventually get a profile. Using Tor is like setting off the bat signal.
The fact that we tolerate this shit is unbelievable.
In other words, just using tails will solve this issue because every session gives you a clean environment.
“The NSA buys ads from ad display companies like Google and seeds them around Tor's access points.”
"On the off chance that [the spam recipient] renders the HTML or clicks a link, [the NSA] can connect your e-mail address to your browser," he explained, which the NSA would have already connected to an IP address. "Using Tor or any proxy wouldn't prevent it."
Everytime I log into a site that I want to buy something from, I always clear cache, cookies, logins before and after using that site.
Yes it can be a PITA, but I think that stops other sites from looking to see what WEB sites you really care about.
about:preferences -> Privacy & Security -> Cookies and Site Data -> [x] Delete cookies and site data when Firefox is closed -> Manage Exceptions
Just don't forget to back up your `~/.mozilla/firefox/*.default-release/cookies.sqlite*` beforehand.
I'm honestly just waiting for people to realise that online ads are the root cause of most of the things people complain about.
Fake news? Check
Surveillance state? Check
Screen addiction? Check
Lack of nuance in any debate? Check
Unsavoury geopolitical influence? Check
The advertising industry somehow manage to stay relevant, despite the fact that their business is literally the same as the dictionary definition of brain washing.
Ah well, old man yells at clouds...
Ads can, in theory, serve a useful purpose, informing individuals of products and services which would legitimately make their lives better (e.g., I bought a low-end immersion blender a year or two ago, didn't know they existed too far beforehand, and am quite happy with the ease/safety improvements over any other blending strategy I used to have, especially for bulk and/or hot liquids, especially compared to what I paid and how much space it takes, but without _some_ kind of ad I might never have known about the product (not a perfect example, since I learned about them from a friend, but hypothetically)).
The push-based ad ecosystem has a tacit assumption that people don't want the products and services being sold. That's a mostly true assumption, but instead of the solution being filtering to better products, well-vetted products, avoiding added-cost-without-added-benefit lookalike products, not advertising outright frauds, ..., the industry has opted for more invasive ways of forcing us to watch things we won't ever care about and siphoning invasive tax/healthcare/... information to slightly reduce the miss-rate in ad serving.
That's probably inevitable without regulation (it's cheaper to bully people into watching ads than to improve your ad inventory, with the side benefit that as an ad network you profit when suckers fall for the frauds too, plus it's easier to charge the company making money instead of the end consumer, so a profit-focused company will naturally swim that direction). As an alternative business model though, imagine great search tools on top of a pool of better ad inventory, where you could choose the demographic info and interests you wanted to be considered for a particular search session instead of having that inferred from your browsing history and the raw copies of your paystubs your employer is likely selling.
I'm not saying the industry can't be useful, I'm saying that it's broken.
If it ends the "brainwashing" it would be because people would not be on the Internet at all. And maybe that's a net good for the world. But here are you and me, on a web site that is itself basically an advertisement for a VC firm.
Artists must get paid, or they will either starve or stop making art.
This is the fundamental threat we have structured our entire civilization around. Art must be labor. Labor must have monetary value. Without income, people must starve and die.
To support this system, we have the most untenable law of the digital age: copyright. The most trivial act, to copy data, shall be monopolized.
But copyright didn't stop there. It grew. We use it to censor. We use it to moderate. We use it to end fraud. We use it to prevent libel. We use it to guarantee collaboration of work. Copyright has become the swiss army knife of law.
When a dull knife slips, it cuts deep.
We're well beyond the arguments for the recommendation graphs and the open market. Adtech, as it's currently practiced, is basically rage farming in disguise.
Gotta maximise that emotional quotient.
Dead Comment