Hacker News new | past | comments | ask | show | jobs | submit login
Breaking TOR
1 point by jarven on Oct 8, 2013 | hide | past | favorite | 2 comments
I recently read an article about the NSA trying to break TOR. They seem to have a lot of problem with this. If you really wanted to look at all the TOR traffic in your country as a government, this should be possible. You should be able to do this with a type of MITM attack. You could advertise all the TOR relay agents IPs inside your ISPs to point at your own Servers. You could either try to setup 3500 TOR relay agents or a more practical way would be to get one server to act as a Relay server for all. Either way you should be able to read the transmission both ways unencrypted without problem if people don’t use pre shared keys. Any thoughts?



Unless you are impersonating the endpoint or the traffic is destined for outside the Tor network, your solution would only allow you to infer that computer X on an ISP's network communicated with XXXXXXXXXX.onion.

Useful but not quite reading "the transmission both ways unencrypted"


Would it not be possible to manipulate the way back by modifying the exit node to a real TOR relay for the xxxxxx.onion?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: