+ Reply to Thread
Results 1 to 13 of 13

Thread: Tor has been defeated by Iran's DPI

  1. #1
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    1/20 19/20
    Today Posts
    0/5 ssssss581

    Tor has been defeated by Iran's DPI

    On average, around 250,000 computers worldwide are connected to the Tor network at any time, making it the leading anti-surveillance technology online.

    But in mid-January, as revolutionary fervour swept the Middle East, the number of computers connected to the Tor network via one major Iranian broadband provider collapsed almost overnight from more than 11,000 to zero.

    Investigations by the Tor Project, the not-for-profit company that runs the system, have since revealed that, crucially, other encrypted traffic such as internet banking was still flowing. It meant Iranian authorities had for the first time found a way to identify and block only Tor connections, and therefore a way to potentially identify dissidents.

    The technology responsible for the new threat was Deep Packet Inspection (DPI), a type of high-end network equipment that uses ultra-fast microchips to read and classify internet traffic in transit. The Iranian authorities used DPI to detect the highly specific parameters Tor uses to establish an encrypted connection.
    From an engineering perspective this is fantastic,” said Mr Lewman of his adversaries' efforts. (...)

    In the last few weeks developers have redesigned the software so that its traffic looks just like any other when it sets up an encrypted connection, and Iranian user numbers are now back to normal. (...)

    It is unknown who supplied Iran with the DPI technology, but few technology manufacturers build equipment capable of reading and classifying internet traffic at the necessary scale and speed. Last year, Nokia-Siemens faced a European Parliament hearing after it admitted selling a mass communications “monitoring centre” to an Iranian mobile network.

    Whoever the supplier, the temporary block on Tor does show that Iran is now more advanced than even China and its Great Firewall in terms of the technology it uses to suppress dissent online, said Mr Lewman.
    Iran cracks down on web dissident technology - Telegraph
    Last edited by Renk; 21.03.11 at 20:29.
    Reply With QuoteReply With Quote
    Thanks

  2. Who Said Thanks:

    BrianBosworth (27.03.13) , Mihai (01.04.11) , SealLion (22.03.11) , isabella (21.03.11) , slikrapid (21.03.11) , anon (21.03.11)

  3. #2


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    On average, around 250,000 computers worldwide are connected to the Tor network at any time, making it the leading anti-surveillance technology online.
    leading? only regarding the total number of users, surely not in the level of security

    the Tor Project’s arms race with Iranian authorities is funded in part by grants from both the Department of Defense and the State Department.
    now you can have an idea of how 'secure' tor actually is, the usa surveillance is probably all over it, they're simply not so raw/unsophisticated as the iranian regime which tries to block the traffic, instead they infiltrate & let the traffic flow rather freely, monitoring/processing/archiving every bit they can/want/require, naturally by using technology that is likely several levels higher than what iran bought (or could buy on the market), not to mention that they have been doing this for quite long now, on a global scale no less - compare this to iran's reach/capabilities and you'll see who the actual heavy-weight threat is

    Iran is now more advanced than even China and its Great Firewall in terms of the technology it uses to suppress dissent online
    think the western 'democracies' are not suppressing dissent? think again
    Reply With QuoteReply With Quote
    Thanks

  4. Who Said Thanks:

    Gapo (22.03.11) , seldom (21.03.11) , Renk (21.03.11)

  5. #3

    Join Date
    26.04.10
    Posts
    329
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss329
    Not a good news at all!
    slikrapid, could you recommend a better, and not complicated alternative?
    Reply With QuoteReply With Quote
    Thanks

  6. #4


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    Quote Originally Posted by seldom
    slikrapid, could you recommend a better, and not complicated alternative?
    ask Renk, he has better info on security issues/systems/software/...
    Reply With QuoteReply With Quote
    Thanks

  7. Who Said Thanks:

    seldom (22.03.11)

  8. #5
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,480
    Activity Longevity
    11/20 19/20
    Today Posts
    1/5 ssss39480
    Quote Originally Posted by seldom View Post
    Not a good news at all!
    slikrapid, could you recommend a better, and not complicated alternative?
    You could opt for living in a mobile home and using a laptop to tunnel data through a private VPN server via stolen/coffee shop Wi-Fi, all of this randomizing your MAC address and computer name every day. Said laptop could be charged wherever there's an easily reachable power socket. Subways (the public transport, not the restaurant chain) after 6pm work pretty fine for this where I live on.

    Truth is, there are many ways and programs for maintaining anonymity on the Internet, and they have their good and bad sides. I've always found Tor's insane amount of hops rather inefficient, but its decentralization largely makes up for that. A VPN would be faster and more efficient network topology-wise, but the server could be easily seized/shut down leaving you with no secure Internet access, and add the existence of logs (kept both by the OpenVPN daemon and the server's ISP) on top of that. But hey, let's not freak out. If you look at the final paragraphs of the article, the Tor developers have actually worked around that, managing to fool the Irani censors... for now.

    By the way, the last line of slikrapid's post is spot-on, as usual. Where do you think China and probably even Iran itself are getting the network hardware that enables them to "control" their Internet access? Right, the United States.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  9. Who Said Thanks:

    Renk (22.03.11) , seldom (22.03.11) , slikrapid (21.03.11)

  10. #6
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    1/20 19/20
    Today Posts
    0/5 ssssss581
    Quote Originally Posted by seldom View Post
    Not a good news at all!
    could you recommend a better, and not complicated alternative?
    The alternative Anon described above seems very good, although a bit complicated. To complicate more, you could connect to the coffee shop wifi through the 3 jondonym cascades, or maybe through reputable multinational offshore based vpn through jondonym.

    An other alternative is the beta jondonym: With it, you can connect to jondonym through tor. All the exits tor node sees, is traffic flow encrypted by your jondo client; all what the first jondonym cascade knows about you, is your tor exit node IP.

    Other likely good alternatives are Freenet, Gnunet, and maybe onioncats vpn.
    Last edited by Renk; 22.03.11 at 01:43.
    Reply With QuoteReply With Quote
    Thanks

  11. Who Said Thanks:

    seldom (22.03.11) , slikrapid (22.03.11)

  12. #7

    Join Date
    16.06.10
    P2P Client
    I can haz candy
    Posts
    590
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss590
    An SSH tunnel proxy chain? If not, use a SOCKS proxy chain. The proxies should come from several different countries (countries with bad diplomatic relations to your country are the best). Worried you may be intercepted? Use SSH tunnels. The heavy encryption may slow the proxy chaining, but hey, at least you got your bits of anonymity.

    Be sure you encrypt your computer with PGP and have a very hard PW (50+).
    Reply With QuoteReply With Quote
    Thanks

  13. Who Said Thanks:

    seldom (22.03.11)

  14. #8

    Join Date
    17.03.11
    P2P Client
    Vuze, uTorrent + Torrent Ratio Keeper
    Posts
    33
    Activity Longevity
    0/20 16/20
    Today Posts
    0/5 sssssss33
    Quote Originally Posted by Gapo View Post
    An SSH tunnel proxy chain? If not, use a SOCKS proxy chain. The proxies should come from several different countries (countries with bad diplomatic relations to your country are the best). Worried you may be intercepted? Use SSH tunnels. The heavy encryption may slow the proxy chaining, but hey, at least you got your bits of anonymity.

    Be sure you encrypt your computer with PGP and have a very hard PW (50+).
    I have some bad feeling about PGP. Too many experts say that's its the best and uncrackable. They recommend to use it...

    You can also use GPRS/EDGE/3G except cafee wi-fi. Just make sure that sim-card is not yours
    Reply With QuoteReply With Quote
    Thanks

  15. #9

    Join Date
    16.06.10
    P2P Client
    I can haz candy
    Posts
    590
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss590
    Quote Originally Posted by LuluShoutX View Post
    I have some bad feeling about PGP. Too many experts say that's its the best and uncrackable. They recommend to use it...
    Look at the source code of it then. It is publicly available.
    Reply With QuoteReply With Quote
    Thanks

  16. #10
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,480
    Activity Longevity
    11/20 19/20
    Today Posts
    1/5 ssss39480
    Quote Originally Posted by LuluShoutX View Post
    You can also use GPRS/EDGE/3G
    = exact geolocation by the mobile carrier with near-flawless accuracy.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  17. #11

    Join Date
    17.03.11
    P2P Client
    Vuze, uTorrent + Torrent Ratio Keeper
    Posts
    33
    Activity Longevity
    0/20 16/20
    Today Posts
    0/5 sssssss33
    Quote Originally Posted by Gapo View Post
    Look at the source code of it then. It is publicly available.
    Need to be c/c++/crypto expert to understand the PGP code while I'm not.

    ---------- Post added at 07:30 ---------- Previous post was at 07:29 ----------

    Quote Originally Posted by anon View Post
    = exact geolocation by the mobile carrier with near-flawless accuracy.
    Same problem with wifi. You shouldn't sit all day near cafee if you want to stay safe.
    Reply With QuoteReply With Quote
    Thanks

  18. #12

    Join Date
    26.04.10
    Posts
    329
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss329
    No Conspiracy Theory Needed: Tor Created for U.S. Gov't Spying
    Privacy and Security Fanatic: No Conspiracy Theory Needed: Tor Created for U.S. Gov't Spying
    Well, waiting on your expert opinion, please...
    Reply With QuoteReply With Quote
    Thanks

  19. Who Said Thanks:

    slikrapid (01.04.11)

  20. #13


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    Just as the Internet was originally developed by DARPA for military communication, people who follow Tor probably knew that the onion router was started by the military.
    speaks for itself, also known as the trojan horse...but when its the only available horse one has...

    Julian Assange recently told students at Cambridge the Internet is "not a technology that favors freedom of speech" or "human rights." He added, "Rather it is a technology that can be used to set up a totalitarian spying regime, the likes of which we have never seen."
    did he also add that he is there to 'protect' our rights/freedom?

    If you want anonymity and privacy, the best thing to do is to encrypt.
    the same logic applies, you might be safer, but not completely, the question is how much safe is safe enough - even further, what kind of an advanced civilization is one in which its members need to be worried about their privacy & security
    Reply With QuoteReply With Quote
    Thanks

  21. Who Said Thanks:

    seldom (02.04.11)

+ Reply to Thread

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •