Is Tor still safe after Germany’s ‘timing attack?’ Answer: It’s complicated…

As a seasoned cybersecurity professional with over two decades of experience under my belt, I must say that the advancements in technologies like Tor and Ricochet-Refresh are truly fascinating. The ongoing cat-and-mouse game between privacy advocates and those seeking to undermine it is a testament to the resilience of both parties.


2021 saw the unveiling of new insights into the methodology German officials used to identify the administrator of a darknet criminal site, revealing a significant weakness in the confidentiality of the Tor network.

According to a report from September 2024, it’s believed that authorities might have traced the IP address of “Andres G,” the suspected operator of the child pornography darknet site “Boystown,” by employing timing analysis and hacking into servers. However, the exact methods used remain undisclosed by the authorities.

Tor indicates that it has no definite knowledge, but believes that the German authorities’ operation might have exploited an older chat messenger known as Ricochet, which the apprehended individual was utilizing.

In reaction to news articles from German media outlets, Tor stated in a blog entry that users may carry on utilizing their browser for secure and anonymous browsing of the internet.

Beyond enhancing relays and data capacity, the Tor network team has lately implemented crucial updates to bolster its defensive systems, enhance speed, and boost overall performance. This was shared by Pavel Zoneff, Tor’s Strategic Communications Director, during his conversation with CryptoMoon.

As a researcher studying Tor’s network, I can confirm that its defenses have undeniably been reinforced. However, labeling it as completely impervious to penetration is a more nuanced perspective.

If you’re able to oversee data movements at their origin, destination, and strategic points in between where you can link the traffic to either end, it is always feasible to perform timing analysis attacks on such data flows, according to Michal Pospieszalski, CEO of MatterFi, a security infrastructure company.

“That said it appears that Tor’s upgrades have made this extraordinarily difficult but it can’t be said that it’s impossible.”

Penetration of Tor’s outdated defense line

According to Panorama and investigative YouTube channel STRG_F, they’ve examined documents concerning the case but haven’t provided details about the methodology behind their timing analysis. However, they did mention that this investigation focused on “entry servers,” or what are commonly referred to as guard nodes, within the Ricochet instant messaging service, which is rumored to have been utilized by Andreas G.

According to Zoneff, based on the available data from The Tor Project, it is believed that an individual using the now discontinued software Ricochet may have had their anonymity compromised due to a guard discovery attack.

When using Tor to browse websites, the traffic typically passes through three sets of nodes: entry (or guard) nodes, middle relays and finally, exit nodes. The guard node is the only node in this circuit that knows the user’s IP address.

For services hidden in the Tor network, like Ricochet, there’s no exit node involved. Instead, connections are established within the Tor network itself, at a rendezvous point. This means that the data doesn’t leave the network and enter the internet. This rendezvous point facilitates communication between two users (such as Ricochet users) anonymously.

Is Tor still safe after Germany’s ‘timing attack?’ Answer: It’s complicated...

In a theoretical assault against an earlier version of Ricochet, authorities might aim to manipulate several key nodes in the Tor network. By doing so, they would boost their probability of catching and intercepting data transmitted through the system.

This type of attack is referred to as a Sybil attack, and according to the CEO of wallet recovery firm Brute Brothers, it requires significant resources.

Instead of this method, they might choose to flood the user’s Ricochet address with numerous requests or packets. This action compels the user to initiate fresh Tor circuits. Since Tor assigns a new relay (middle node) for each circuit, the objective is to eventually link through a malicious middle node operated by the authorities. The more such nodes they control, the greater their likelihood of success in this strategy.

When a link is established to a potentially harmful intermediary server, it might be challenging for authorities to swiftly pinpoint the user’s IP address directly. Nevertheless, they can employ timing analysis to compare the data flow passing through the hacked intermediate server with the traffic patterns noticed at the initial (protective) node.

Time-based analysis entails meticulously assessing the time taken for data packets to travel from one node to another. By examining these time measurements, it is possible to potentially determine which surveillance node might have been employed by the suspected individual.

When the guard node has been pinpointed, the relevant authorities may ask the Internet Service Provider (ISP) linked to that guard node for the user’s corresponding IP address.

This would effectively de-anonymize the target.

CryptoMoon doesn’t assert that the following approach was definitively employed by German officials, instead, they offer it as a potential scenario demonstrating how law enforcement might identify a suspect.

Tor says suspected attack vector may be outdated

Recent updates to Tor’s structure make such Sybil attacks much harder to conduct. 

As an analyst at Secret Foundation, an organization specializing in the creation of secure and confidential Web3 tools, I often find that some of our clients may have their own unique set of challenges or sensitivities to navigate.

“Vulnerabilities will always be found and they’ll be patched by responsible teams as fast as they are able.”

2019 saw the termination of the original Ricochet, followed by its replacement with Ricochet-Refresh. This new iteration features the “vanguard” system, a design meant to combat similar types of attacks.

A Sybil attack vector takes advantage of the random sampling of middle nodes. 

In the updated Vanguard design, circuits are now allocated to groups of relays, where the rotation timings are randomly varied.

This means all hops within a circuit are pinned to a group of nodes.

Is Tor still safe after Germany’s ‘timing attack?’ Answer: It’s complicated...

In such a scenario, if malevolent entities establish harmful nodes with the intention of flooding interactions towards a user on the Ricochet-Refresh system, these messages would not be able to link to their trap nodes.

For any security precaution put in place, there’s always a corresponding counteraction or response,” Weinberger pointed out.

Though they reduced the immediate threat significantly, it’s essential to understand that it’s not completely immune,” he pointed out, further explaining that advanced nations might be more successful in unmasking users because of their extensive resources.

Tor node-rich Germany

Tor’s privacy features become stronger if its nodes are decentralized around the world. 

Zoneff suggested that if possible, individuals should lend a hand by volunteering and providing bandwidth and relays to expand and enrich the Tor network. By doing this, we’ll maintain a variety of hardware, software, and geographical components within the Tor network, which will in turn enhance its stability and security.

Currently, a big chunk of Tor’s relays are in Germany.

Is Tor still safe after Germany’s ‘timing attack?’ Answer: It’s complicated...

By October 18th, Germany hosted approximately 232 out of every 500 Tor relay nodes, as indicated by Tor Metrics data. Additionally, Germany is globally recognized for having the highest consensus weight, a metric that takes into account factors such as bandwidth and server capacity.

Approximately 36.73% of the total selection weight within the network is attributed to German relays collectively.

According to Weinberger, when a user links up with a jurisdiction, they’re not bound by their physical location to choose a server that’s nearer to them.

He mentioned that the Tor client tends to select a guard node with superior performance over a slower one. Given this, it’s reasonable to assume that powerful nations might operate stable and high-bandwidth guard nodes for an extended period, aiming to draw in numerous Tor users who connect to them.

Despite the U.S. having the second most relays (1,778), it is the Netherlands that holds the second place in consensus weight, even with fewer relays (784).

According to Pospieszalski, in order to conduct timing analysis attacks, it’s advantageous for a government to have the capability to insert their own nodes within the current network system. It’s more straightforward for a government to accomplish this within its own territory.

Should the Tor network be comprised of an even distribution of nodes across countries, conducting detailed timing analysis for cross-border investigations would require substantial effort.

Safe for users, but criminals should be on edge

Tor’s enhanced security measures make it challenging for nation-states or resourceful entities to perform timing analysis on its users, yet it’s crucial to note that it doesn’t render such an activity impossible.

Also, technological advancements are providing more weapons to de-anonymize users.

Essentially, an AI system with vast amounts of data collection points and superior processing capabilities would excel in time analysis, to the point where it might not be surprising that such a development is already hidden behind closed doors somewhere, according to Pospieszalski.

Is it still secure for Tor to ensure anonymity for individuals demanding increased levels of privacy protection?

In simpler terms, experts talking to CryptoMoon concluded that regular users can continue using cryptocurrencies safely. However, advancements in technology constantly challenge the illegal activities of criminals operating within the darknet.

The subject of privacy is quite intriguing, and it’s a point of contention with some advocates in both the mainstream industry and government, while others argue that privacy in the Web3 environment may be exploited by malicious individuals,” as Loud stated.

Could anonymity in browsing persist? Possibly. It’s like a competition where unpredictable events could shape the final result within the coming years.

Read More

2024-10-18 15:04