Hacker News new | past | comments | ask | show | jobs | submit login

This accompanying article has useful context: http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack...

> But the documents suggest that the fundamental security of the Tor service remains intact. One top-secret presentation, titled 'Tor Stinks', states: "We will never be able to de-anonymize all Tor users all the time." It continues: "With manual analysis we can de-anonymize a very small fraction of Tor users," and says the agency has had "no success de-anonymizing a user in response" to a specific request.

So only with "manual analysis" can intel agencies have any success, and that appears to be with a small subset of users who have other vulnerabilities. But when targeting a specific user, the NSA appears to have had no success in de-anonymizing them.




This needs to be higher. I think this was the best scenario anyone who knows Tor could hope for. The attacks against Tor, when used correctly, are well understood. And, assuming this presentation is accurate,the capabilities of adverserial semi-global attackers aren't much different from what we were expecting.

I would love to see if they have similar slide-decks for I2P, which is often compared with Tor for Hidden Service/eepsite usage.


On page 5 of the 'Tor Stinks' full document is a clipart picture of a terrorist.

So... Somewhere in the bowels of the NSA is a graphic artist that slaps beards and guns to stock clip-art. fun job.

http://www.theguardian.com/world/interactive/2013/oct/04/tor...




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: