- 
Herald: So now, the next talk that
we have here for one hour from 8:30
 
- 
’til 9:30 PM is “The Tor Network
– we’re living in interesting times”.
 
- 
I don’t know how many of you are familiar
with the works of Terry Pratchett.
 
- 
But anyways, in the novels of Terry
Pratchett there is the saying:
 
- 
“And may you live in interesting
times!” that is actually a curse
 
- 
for someone that you especially
dislike; because it usually means
 
- 
that you’re in a lot of trouble. So
I guess we’re all very excited
 
- 
for this year’s ‘Tor Talk’ by the
everlasting Dream Team:
 
- 
Jacob Appelbaum and Roger
Dingledine! There you go!
 
- 
cheers and applause
Give it up!
 
- 
huge applause
 
- 
Jacob Appelbaum: So, thanks very much
to the guy who brought me a Mate.
 
- 
I learned his name is Alexander. It’s
never a good idea to take drugs
 
- 
from strangers, so I introduced
myself before I drank it. Thank you.
 
- 
laughter
 
- 
First I wanted to say that following up
after Glenn Greenwald is a great honor
 
- 
and a really difficult thing to do, that’s
a really tough act to follow, and
 
- 
he’s pretty much one of,
I think, our heroes. So, it’s
 
- 
really great to be able to share the stage
with him, even for just a brief moment.
 
- 
And I wanted to do something a little
unconventional when we started
 
- 
and Roger agreed. Which is that we
want people who have questions
 
- 
– since I suspect some things happened
this year that arouse a lot of questions
 
- 
in people – we’d like you to write those
questions down, pass them to an Angel
 
- 
or to just bring them to the front
of the stage as soon as possible
 
- 
during the talk, so that we can answer as
many of your questions as is possible.
 
- 
This is a lot of stuff that happened,
there’s a lot of confusion, and we wanna
 
- 
make sure that people feel like
we are actually answering
 
- 
those questions in a useful way.
And if you wanna do that, it’d be great,
 
- 
and otherwise, we’re gonna try to have
the second half of our talk be mostly
 
- 
space for questioning.
So with that, here is Roger.
 
- 
Roger Dingledine: Okay, so, a lot of
things have happened over this past year,
 
- 
and we’re gonna try to cover
as many of them as we can.
 
- 
Here’s a great quote
from either NSA or GCHQ,
 
- 
I’m actually not sure which one it is.
 
- 
But we’re gonna start a little bit
earlier in the process than this
 
- 
and work our way up to that.
So, we’re in a war,
 
- 
or rather, conflict of perception here.
 
- 
There are a lot – I mean,
you saw Glenn’s talk earlier
 
- 
– there are a lot of large media
organizations out there
 
- 
that are trying to present Tor
in lots of different ways,
 
- 
and we all here understand
the value that Tor provides
 
- 
to the world, but there are a growing
number of people around the world
 
- 
who are learning about Tor
not from our website, or from
 
- 
seeing one of these talks or from
learning it from somebody who uses it
 
- 
and teaches them how to use it.
But they read the Time Magazine
 
- 
or Economist or whatever the
mainstream newspapers are,
 
- 
and part of our challenge is how do we
help you, and help the rest of the world
 
- 
do outreach and education, so that
people can understand what Tor is for
 
- 
and how it works and what
sorts of people actually use it.
 
- 
So, e.g. GCHQ has been given instructions
 
- 
to try to kill Tor by, I mean, who knows,
maybe they thought of it on their own,
 
- 
maybe we can imagine some nearby
governments asked them to do it.
 
- 
And part of the challenge…
they say: “we have to kill it
 
- 
because of child porn”. And it
turns out that we actually do know
 
- 
that some people around the
world are using Tor for child porn.
 
- 
E.g. we have talked to
a lot of federal agencies
 
- 
who use Tor to fetch child porn.
subdued laughter
 
- 
I talked to people in the
FBI who use Tor every day
 
- 
to safely reach the websites
that they want to investigate.
 
- 
The most crazy example of this is
actually the Internet Watch Foundation.
 
- 
How many people here have heard
of the Internet Watch Foundation?
 
- 
I see a very small number of hands.
They are the censorship wing
 
- 
of the British Government. They are the
sort of quasi-government organization
 
- 
who is tasked with coming up with the
blacklist for the internet for England.
 
- 
And, we got email from them a few years
ago, saying – not what you’d expect,
 
- 
you’d expect “Hey, can you please shut
this thing down, can you turn it off,
 
- 
it’s a big hassle for us!” – the
question they asked me was:
 
- 
“How can we make Tor faster?”
laughter, applause
 
- 
It turns out that they need Tor,
because people report URLs to them,
 
- 
they need to fetch them somehow.
It turns out that when you go the URL
 
- 
with the allegedly bad stuff on
it and you’re coming from
 
- 
the Internet Watch Foundation’s
IP address, they give you kittens!
 
- 
laughter
Who would have known?
 
- 
laughter, applause
 
- 
So it turns out that these censors
need an anonymity system
 
- 
in order to censor their internet.
laughter Fun times.
 
- 
So another challenge here: at the
same point, one of my side hobbies
 
- 
is teaching law enforcement how the
internet works, and how security works
 
- 
and how Tor works. So, yeah, their job
does suck, but it’s actually not our fault
 
- 
that their job sucks. There are a lot
of different challenges to successfully
 
- 
being a good, honest law
enforcement person these days.
 
- 
So, e.g. I went to Amsterdam and Brussels
 
- 
in January of this past year to try to
teach various law enforcement groups.
 
- 
And I ended up having a four-hour
debate with the Dutch regional Police,
 
- 
and then another four-hour debate
with a Belgian cybercrime unit,
 
- 
and then another four-hour debate
with the Dutch national Police.
 
- 
And there are a lot of good-meaning, smart
people in each of these organizations,
 
- 
but they end up, as a group, doing
sometimes quite bad things.
 
- 
So part of our challenge is: how do we
teach them that Tor is not the enemy
 
- 
for them? And there are a couple of
stories that I’ve been trying to refine
 
- 
using on them. One of them they always
pull out, the “But what about child porn?
 
- 
What about bad people? What about some
creep using Tor to do bad things?”.
 
- 
And one of the arguments that I tried on
them was, “Okay, so on the one hand
 
- 
we have a girl in Syria
who is alive right now
 
- 
because of Tor. Because her family
was able to communicate safely
 
- 
and the Syrian military didn’t
break in and murder all of them.
 
- 
On the other hand, we have a girl
in America who is getting hassled
 
- 
by some creep on the internet
who is stalking her over Tor.”
 
- 
So the question is, how do we balance,
how do we value these things?
 
- 
How do we assign a value
to the girl in Syria?
 
- 
How do we assign a value
to the girl in America
 
- 
so that we can decide which
one of these is more important?
 
- 
And actually the answer is, you
don’t get to make that choice,
 
- 
that’s not the right question to ask.
Because if we take Tor away
 
- 
from the girl in Syria, she’s
going to die. If we take Tor away
 
- 
from the creep in America, he’s got a lot
of other options for how he can be a creep
 
- 
and start stalking people.
So if you’re a bad person,
 
- 
for various definitions of ‘bad person’,
and you’re willing to break laws
 
- 
or go around social norms,
you’ve got a lot of other options
 
- 
besides what Tor provides. Whereas there
are very few tools out there like Tor
 
- 
for honest, I’d like to say law-abiding,
 
- 
but let’s go with civilization-abiding
citizens out there.
 
- 
applause
 
- 
Jacob: And it’s important to understand
that this hypothetical thing is actually
 
- 
also true for certain values.
So at our Tor developer meeting
 
- 
that we had in Munich recently,
that Syrian woman came to us,
 
- 
and thanked us for Tor. She said:
“I’m from a city called Homs.
 
- 
You might have heard about it,
it’s not a city anymore. I used Tor.
 
- 
My family used Tor. We were able to
keep ourselves safe on the internet
 
- 
thanks to Tor. So I wanted to come
here to Munich to tell you this.
 
- 
Thank you for the work that you’re
doing.” And for people who
 
- 
– this was their first dev meeting –
they were completely blown away
 
- 
to meet this person. “Wow,
the stuff that we’re working on,
 
- 
it really does matter, there
are real people behind it”.
 
- 
And we were all, I think, very touched
by it, and all of us know someone
 
- 
who has been on the receiving end
of people being jerks on the internet.
 
- 
So this is a real thing where there
are real people involved, and
 
- 
it’s really important to understand
that if you remove the option
 
- 
for that woman in Syria – or you
here in Germany, now that we know
 
- 
what Edward Snowden has told the world…
 
- 
Those bad guys, those jerks
– for different values of that –
 
- 
they always have options. But very
rarely do all of us have options
 
- 
that will actually keep us safe.
And Tor is certainly not the only one,
 
- 
but right now, and we hope in this
talk you’ll see that we’re making
 
- 
the right trade-off by working on Tor.
 
- 
Roger: One of the other talks that I give
to them, one of the other stories
 
- 
that I give to them, one of the big
questions they always ask me is:
 
- 
“But what about terrorists?
Aren’t you helping terrorists?”
 
- 
And we can and we should talk about
“What do you mean by terrorists?”
 
- 
because in China they have a very
different definition of terrorists
 
- 
and in Gaza they have a very
different definition of terrorists, and
 
- 
in America, they are always thinking
of a small number of people
 
- 
in some Middle-Eastern country who are
trying to blow up buildings or something –
 
- 
Jacob: Mohammed Badguy,
I think is his name.
 
- 
Roger: Yes, that –
Jacob: In the NSA slides.
 
- 
Roger: Yes. So, scenario 1:
 
- 
I want to build a tool that
works for millions of people,
 
- 
it will work for the next year,
and I can tell you how it works,
 
- 
so you can help me evaluate
it. That’s Tor’s problem.
 
- 
Scenario 2: I want to build a tool that
will work for the next 2 weeks,
 
- 
it will work for 20 people and I’m
not going to tell you about it.
 
- 
There are so many more
ways of solving scenario 2
 
- 
than solving scenario 1. The bad
guys – for all sorts of definitions –
 
- 
the bad guys have a lot more
options on how they can keep safe.
 
- 
They don’t have to scale,
it doesn’t have to last forever,
 
- 
they don’t want peer review, they
don’t want anybody to even know
 
- 
that it’s happening. So the
challenge that Tor has is
 
- 
we wanna build something that works for
everybody and that everybody can analyze
 
- 
and learn about. That’s a much harder
problem, there are far fewer ways
 
- 
of solving that. So, the terrorists,
they got a lot of options.
 
- 
That sucks. We need to build tools that
can keep the rest of the world safe.
 
- 
Jacob: And it’s important, really, to try
to have some good rhetorical arguments,
 
- 
I think. I mean, we sort of
put a few facts up here.
 
- 
One interesting point to mention
is that people who really
 
- 
don’t want anonymity to exist
in a practical sense, maybe
 
- 
not even in a theoretical, Human
Rights sense either, but definitely
 
- 
in a practical sense, they’re not really
having honest conversations about it.
 
- 
E.g. this DoJ study – the Department
of Justice in the United States – they
 
- 
actually started to do a study where they
classified traffic leaving Tor exit nodes.
 
- 
Which… it’s interesting that they
were basically probably wiretapping
 
- 
an exit node to do that study. And
I wonder how they went about that – but
 
- 
nonetheless, they came up with the
number 3% of the traffic being bad.
 
- 
And then they aborted the study because
they received many DMCA takedown notices.
 
- 
laughter
Roger: Yes, they –
 
- 
Jacob: Apparently even the DMCA
is a problem to finding out answers!
 
- 
That plague of society! (?)
 
- 
Roger: interrupts They asked a
university to run the Tor exit for them
 
- 
and they were just starting out
doing their study, and then
 
- 
the university started getting
DMCA takedowns and said:
 
- 
“Well, we have to stop, the
lawyers told us to stop!”,
 
- 
and the Department of Justice said:
“We’re the Department of Justice,
 
- 
keep doing it”, and then they
turned it off. laughter
 
- 
So, not sure how the balance of power
goes there, but the initial results
 
- 
they were looking towards
were about 3% of the traffic
 
- 
coming out of that Tor exit node was bad,
 
- 
but I haven’t figured out what they mean
by ‘bad’. But I’ll take it if it’s 3%.
 
- 
Jacob: And I personally don’t
like to use the word ‘war’
 
- 
when talking about the internet.
And I particularly dislike
 
- 
when we talk about actual
issues of terrorism.
 
- 
And I think that we should talk about it
in terms of perception and conflict.
 
- 
And one of the most frustrating
things is: the BBC
 
- 
actually has articles on their
website instructing people
 
- 
how to use the Silk Road and
Tor together to buy drugs.
 
- 
We very, very seriously do
not ever advocate that,
 
- 
for a bunch of reasons… Not the
least of which is that even though
 
- 
Bitcoin is amazing, it’s not
an anonymous currency.
 
- 
And it isn’t the case that these websites
are necessarily a good idea and…
 
- 
but it won’t be Tor, I think, that will be
the weakest link. But the fact that
 
- 
the BBC promotes that – it’s because
they generally have “A man bites dog”.
 
- 
You could say that that’s their
entire Tor related ecosystem.
 
- 
Anything that could be just
kind of a little bit interesting,
 
- 
they’ll run with it. So they have
something to say about it.
 
- 
And in this case they literally were
promoting and pushing for people
 
- 
to buy drugs. Which is crazy to me, to
imagine that. And that really impacts
 
- 
the way that people perceive the
Tor Project and the Tor Network.
 
- 
And what we’re trying to do
is not that particular thing.
 
- 
That is a sort of side effect that occurs.
What we want is for every person
 
- 
to have the right to speak freely and the
right to read anonymously on the internet.
 
- 
Roger: And we also need to keep in
mind the different incentive structures
 
- 
that they have. So BBC posted their
first article about Silk Road and Tor.
 
- 
And the comment section was
packed with “Oh, wow, thanks!
 
- 
Oh, this is great! Oh, I don’t have to go
to the street corner and getting shot!
 
- 
Oh! Wow! Thanks! This is great!” Just
comment after comment, of people saying:
 
- 
“Thank you for telling me about this!”
And then a week later they posted
 
- 
a follow-up article saying “And we
bought some, and it was really good!”
 
- 
laughter and applause
 
- 
So what motivation are they doing here?
 
- 
So their goal in this case is: “Let’s get
more clicks. Doesn’t matter what it takes,
 
- 
doesn’t matter what we
destroy while we’re doing it.”
 
- 
Jacob: So that has some serious problems,
obviously. Because then there are
 
- 
different structures that exist to attack
– as part of the War on Some Drugs –
 
- 
and they want to show that their
mission is of course impacted by Tor.
 
- 
They want to have an enemy that
they can paint a target on. They want
 
- 
something sexy that they can get funding
for. So here’s a little funny story
 
- 
about an agent, as it says in the last
point, who showed this massive drop
 
- 
in the Tor Network load after Silk
Road was busted. Right? Because
 
- 
everybody realizes of course that all
of the anonymity traffic in the world
 
- 
must be for elicit (?) things.
 
- 
Roger: So this was at a particular meeting
 
- 
where they were trying to get more funding
for this. This is a US Government person
 
- 
who basically said: “I evaluated
the Tor Network load
 
- 
during the Silk Road bust. And
I saw 50% network load drop
 
- 
when the Silk Road bust happened.”
So I started out with him
 
- 
arguing: “Actually, you know, when
there’s a huge amount of publicity about
 
- 
– I don’t know – if Tor is broken, we can
understand, that would be reasonable,
 
- 
that some Tor people would stop using
Tor for a little while, in order to wait
 
- 
for more facts to come out and then will
be more prepared for it.” But then
 
- 
I thought: “You know, wait a minute, we
got the Tor Metrics database. We have
 
- 
all of this data of load on the network.”
 
- 
So then I went: “Let’s go actually
see if there was a 50% drop on
 
- 
the Tor Network!” So the green
line here is the capacity
 
- 
of the Tor Network over time. So the
amount of bytes that relays can push
 
- 
if we were loading it down
completely. And the purple line is
 
- 
the number of bytes that are actually
handled on the network over time.
 
- 
Jacob: Can you guess? If you don’t
look at the date at the bottom,
 
- 
can you show what that
agent was talking about?
 
- 
Or is the agent totally full of shit?
laughter
 
- 
Just a… hypothetical question, but if you
have a theo… anyone? Shout it out! Yeah!
 
- 
[unintelligible from audience]
 
- 
Oh that’s right! It didn’t go down by 50%!
laughter
 
- 
Wow! He was completely wrong!
 
- 
But just for the record, that’s
where he said there was a drop!
 
- 
laughter and applause
 
- 
Roger: And while we’ve talked you had
to read these graphs. Here is a graph
 
- 
of the overall network growth
over the past 3 or 4 years.
 
- 
So the green line, again, is the amount of
capacity. And we’ve seen a bunch of people
 
- 
adding fast relays recently,
after the Snowden issues.
 
- 
And we’ll talk a little bit later about
what other reasons people are running
 
- 
more capacity lately, as the
load on the network goes up.
 
- 
Okay. And then there is the
‘Dark Web’. Or the ‘Deep Web’.
 
- 
Or the Whatever-else-the-hell-you-call-it
Web. And again,
 
- 
this comes back to media trying to
produce as many articles as they can.
 
- 
So here’s the basic… I’ll give you
the primer on this ‘Dark Web’ thing.
 
- 
Statement 1: “The Dark Web is every web
page out there that Google can’t index.”
 
- 
That’s the definition of the Dark Web.
laughter and applause
 
- 
applause
 
- 
So every Corporate database,
every Government database,
 
- 
everything that you access with a
web browser at work or whatever,
 
- 
all those things that Google can’t get to,
that is the Dark Web. That’s statement 1.
 
- 
Statement 2: “90+X% of web
pages are in the Dark Web.”
 
- 
So these were both well-known
facts a year ago.
 
- 
Statement 3, that the media has
added this year: “The only way
 
- 
to access the Dark Web is through Tor.”
laughter, some applause
 
- 
These 3 statements together
sell more and more articles
 
- 
because it’s great, people buy them,
they’re all shocked: “Oh my god,
 
- 
the web is bigger than I thought,
and it’s all because of Tor”.
 
- 
laughter and applause
 
- 
Jacob: So, really… the reality of this
is that it’s not actually the case.
 
- 
Obviously that’s a completely laughable
thing. And for everyone that’s here –
 
- 
not necessarily people watching on the
video stream – but for everyone here,
 
- 
I think, you realize how ridiculous
that is. That entire setup
 
- 
is obviously a kind of ‘clickbait’, if
you would call it something like that.
 
- 
There are a few high-profile Hidden
Services. And actually, this is
 
- 
a show of hands: raise your hand
if you run a Tor Hidden Service!
 
- 
few hands go up
 
- 
Right. So, no one’s ever heard of your
Tor Hidden Service. Almost certainly.
 
- 
And these are the ones that people have
heard of. And this is something which is
 
- 
kind of a fascinating reality
which is that these 4 sites,
 
- 
or these 4 entities have
produced most of the stories
 
- 
related to the deep gaping
whatever web, that
 
- 
if you wanna call it the Dark Web. And,
in fact, for the most part, it’s been…
 
- 
I would say the Top one
e.g., with Wikileaks,
 
- 
it’s a positive example. And,
in fact, with GlobaLeaks,
 
- 
which is something that Arturo Filastò
and a number of other really great
 
- 
Italian hackers here have been working
on, GlobaLeaks, they’re deploying
 
- 
more and more Hidden Services that you
also haven’t heard about. For localized
 
- 
corruption, reporting and whistleblowing.
But the news doesn’t report about
 
- 
Arturo’s great work. The news
reports are on The Farmer’s Market,
 
- 
on Freedom Hosting and
on Silk Road. And those things
 
- 
also bring out a disproportionate
amount of incredible negative attention.
 
- 
In the case of freedom hosting, we
have a developer, Mike Perry, who’s
 
- 
kind of the most incredible
evil genius alive today.
 
- 
I think he’s probably at about 2 Mike
Perrys right now. That’ll be my guess.
 
- 
And he was relentlessly attacked.
 
- 
Because he happened to have
a registration for a company
 
- 
which had an F and an H in the name.
 
- 
Wasn’t actually even close
to what’s up there now.
 
- 
And he was relentlessly attacked because
the topics that the other sites have
 
- 
as part of their customer base or as part
of the things that they’re pushing online,
 
- 
they really pull on people’s
hearts in a big way.
 
- 
And that sort of created
a lot of stress. I mean,
 
- 
the first issue, Wikileaks, created a
lot of stress for people working on Tor
 
- 
in various different ways. But for Mike
Perry, he was personally targeted,
 
- 
in sort of Co-Intel-Pro style
harassment. And really sad,
 
- 
in a really sad series of events.
And of course, the news
 
- 
also picked up on that, in some
negative ways. And they really, really
 
- 
picked up on that. And that’s a really
big part of I think you could call it
 
- 
a kind of cultural conflict
that we’re in, right now.
 
- 
The farmer’s market has also
quite an interesting story.
 
- 
Which I think you wanted to tell.
 
- 
Roger: Yeah, so, I actually heard from
a DEA person who was involved
 
- 
in the eventual bust of
the Farmer’s Market story.
 
- 
Long ago there was a website on
the internet, and they sold drugs.
 
- 
Oh my god. And there were people
who bought drugs from this website
 
- 
and Tor was nowhere in the story. It
was some website in South East Asia.
 
- 
And the DEA wanted to take
it down. So they learned…
 
- 
I mean the website was public. It was
a public web server. So they sent
 
- 
some sort of letter to the country that it
was in. And the country that it was in
 
- 
said: “Screw you!”. And then they said:
“Okay, well, I guess we can’t take down
 
- 
the web server”. So then they started to
try to investigate the people behind it.
 
- 
And it turns out the people
behind it used Hushmail.
 
- 
So they were happily communicating
with each other very safely.
 
- 
So the folks in the US
sent a letter to Canada.
 
- 
And then Canada made Hushmail basically
give them the entire database
 
- 
of all the emails that these people
had sent. And then, a year or 2 later,
 
- 
these people discovered Tor. And they’re
like: “Hey we should switch our website
 
- 
over to Tor and then it will be safe.
That sounds good!”. The DEA people
 
- 
were watching them the whole time
looking for a good time to bust them.
 
- 
And then they switched over to Tor, and
then 6 months later it was a good time
 
- 
to bust them. So then there were all
these newspaper articles about how
 
- 
Tor Hidden Services are
obviously broken. And
 
- 
the first time I heard the story
I was thinking in myself:
 
- 
“Idiot drug sellers use Paypal
– get busted – end of story”.
 
- 
laughing
 
- 
But they were actually using Paypal
correctly. They had innocent people
 
- 
around the world who were receiving
Paypal payments and turning it into some
 
- 
Panama based e-currency or
something. So the better lesson
 
- 
of the story is: “Idiot drug sellers
use Hushmail – get busted”.
 
- 
So there are a lot of different
pieces of all of these.
 
- 
Jacob: Don’t use Hushmail!
laughter
 
- 
Seriously! It’s a bad idea! And
don’t use things where they have
 
- 
a habit of backdooring their
service or cooperating
 
- 
with so called ‘lawful interception
orders’. Because it tells you that
 
- 
their system is not secure. And it’s clear
that Hushmail falls into that category.
 
- 
They fundamentally have chosen that
that is what they would like to do.
 
- 
And they should have that reputation.
And we should respect them exactly
 
- 
as much as they deserve for that. So
don’t use their service. If you can.
 
- 
Especially if you’re gonna do
this kind of stuff. laughter
 
- 
Or maybe what I mean is: guys,
do that – use Hushmail.
 
- 
But everybody else, protect yourself!
laughter
 
- 
So, the thing is that
not every single person
 
- 
is actually stupid enough to use Hushmail.
 
- 
So as a result, we had started to
see some pretty crazy stuff happen.
 
- 
Which we of course knew would happen and
we always understood that this would be
 
- 
a vector. So, in this case,
this year we saw,
 
- 
I think, one of the probably not
the most interesting exploits
 
- 
that we’ve ever seen. But one
of the most interesting exploits
 
- 
we’ve ever seen deployed
against a broad scale of users.
 
- 
And we’re not exactly sure
who was behind it. Though
 
- 
there was an FBI person who went
to court in Ireland and did in fact
 
- 
claim that they were behind it. The IP
space that the exploit connected back to
 
- 
was either SAIC or NSA.
And I had an exchange
 
- 
with one of the guys behind the VUPEN
exploit company. And he has
 
- 
on a couple of occasions mentioned
writing exploits for Tor Browser.
 
- 
And what he really means is Firefox. And
 
- 
this is a serious problem of course. If
they want to target a person, though,
 
- 
the first they have to actually find them.
So traditionally, if you’re not using Tor,
 
- 
they go to your house, they plug in some
gear. They go to the ISP upstream,
 
- 
and they plug in some gear. Or they do
some interception with an IMSI catcher,
 
- 
and things like that. Most of these
techniques, I’ll talk about on Monday
 
- 
with Claudio. If you’re interested.
But basically it’s the same.
 
- 
They find out who you are,
then they begin to target you,
 
- 
then they serve you an exploit.
This year one of the differences is
 
- 
that they had actually taken over a Tor
Hidden Service. And started to serve up
 
- 
an exploit from that. Just trying
to exploit every single person
 
- 
that visited the Hidden Service. So there
was a period of time when you could
 
- 
really badly troll all of your friends
by just putting a link up where
 
- 
it would load in an iFrame and they would
have been exploited. If they were running
 
- 
an old version of Firefox. And
an old version of Tor Browser.
 
- 
Which was an interesting twist. They
didn’t actually, as far as we know,
 
- 
use that exploit against anyone
while it was a fresh Zeroday.
 
- 
But they did write it. And they
did serve it out. And they gave
 
- 
the rest of the world the payload
to use against whoever they’d like.
 
- 
So, when the FBI did this, they basically
gave an exploit against Firefox
 
- 
and Tor Browser to the Syrian Electronic
Army who couldn’t have written one,
 
- 
even if they wanted to. This is
a really interesting difference
 
- 
between other ways that the FBI might
try to bust you, where they can localize
 
- 
the damage of hitting untargeted
people who are otherwise innocent,
 
- 
especially. But we’ve asked
Firefox to try to integrate
 
- 
some of these privacy-related things that
we’ve done. We’d like to be able to be
 
- 
more up-to-speed with Firefox and
they generally seem premili, too (?)
 
- 
and I think that’s a fair thing to say.
But we have a de-synchronisation.
 
- 
But even with that de-synchronisation we
were still ahead of what they were doing
 
- 
as far as we can tell. But they
are actually at the point where
 
- 
they have hired probably some people
from this community – fuck you –
 
- 
and they write those exploits.
applause
 
- 
And serve them up.
And so that is a new turn.
 
- 
We had not seen that before this year.
And that’s a really serious change.
 
- 
As a result we’ve obviously been
looking into Chrome, which has
 
- 
a very different architecture. And in some
cases it’s significantly harder to exploit
 
- 
than Firefox. Even with just very
straight-forward bugs which should be
 
- 
very easy to exploit the Chrome team
has done a good job. We want to have
 
- 
a lot of diversity in the different
browsers. But we have a very strict
 
- 
set of requirements for protecting
Privacy with Tor Browser.
 
- 
And there’s a whole design document
out there. So just adding Tor
 
- 
and a web browser together is not quite
enough. You need some actual thoughts.
 
- 
That have been – mostly by Mike Perry
and Aron Clark (?) – have been elucidated
 
- 
in the Tor Browser design document.
So we’re hoping to work on that.
 
- 
If anyone here would like to work on that:
that’s really something where we really
 
- 
need some help. Because there is
really only one Mike Perry. Literately
 
- 
and figuratively.
 
- 
Roger: Okay. Another exciting topic
people have been talking about lately
 
- 
is the diversity of funding. A lot of our
funding comes from governments.
 
- 
US mostly but some other ones as
well. Because they have things
 
- 
that they want us to work on. So once upon
a time when I was looking at fundraising
 
- 
and how to get money I would go to places
and I would say: “We’ve got 10 things
 
- 
we want to work on. If you
want to fund one of these 10,
 
- 
you can help us set our priorities.
We really want to work on
 
- 
circumventing censorship, we really want
to work on anonymity, we really want
 
- 
to work on Tor Browser safety. So
if you have funding for one of these
 
- 
then we’ll focus on the one that
you’re most interested in”.
 
- 
So there’s some trade-offs here. On the
one hand government funding is good
 
- 
because we can do more things. That’s
great. A lot of the stuff that you’ve seen
 
- 
from Tor over the past couple of years
comes from people who are paid full-time
 
- 
to be able to work on Tor and focus
on it and not have to worry about
 
- 
where they’re gonna pay their rent
or where they’re gonna get food.
 
- 
On the other hand it’s bad because
funders can influence our priorities.
 
- 
Now, there’s no conspiracy. It’s not
that people come to us and say:
 
- 
“Here’s money, do a backdoor, etc.”
We’re never gonna put any backdoors
 
- 
in Tor, ever.
 
- 
Jacob: Maybe you could tell the story
 
- 
about that really high-pitched lady
who tried to get you, to tell you that
 
- 
that was your duty and then you explained…
 
- 
Roger: Give me a few more details!
laughter
 
- 
Jacob: People have approached us,
obviously, in order to try to get us
 
- 
to do these types of things. And
this is a serious commitment
 
- 
that the whole Tor community gets behind.
Which is that we will never ever
 
- 
put in a backdoor. And any time that we
can tell that something has gone wrong
 
- 
we try to fix it as soon
as is possible regardless
 
- 
– actually I would say for myself – of any
other consequences. That our commitment
 
- 
to protecting anonymity
of our user base extends
 
- 
beyond any reasonable commitment,
actually. And we really believe
 
- 
that commitment. And there are people
that have tried to get us to change that.
 
- 
Tried to tell us that “oh, it’s only
because you’re living in the free world,
 
- 
and you’re able to have a company
that (?) and make a profit
 
- 
that you can even right the supper (?). So
come on! Do your duty!” And of course
 
- 
when we tell them we’re non-profit
and that we’re not gonna do it,
 
- 
they’re completely
dumbfounded. For example.
 
- 
Roger: Now I remember that discussion, yes!
Jacob: Yeah!
 
- 
applause
 
- 
Roger: This was a discussion with
a US Department of Justice person
 
- 
who basically said: “It’s your…
the Congress has given us,
 
- 
the Department of Justice, the
right to backdoor everything,
 
- 
and you have a tool
that you haven’t made
 
- 
easy for us to backdoor. So
it’s your responsibility to fix it
 
- 
so that we can use the privileges
and rights given us by Congress
 
- 
on surveilling everybody. And
you are taking advantage
 
- 
of the situation that we’ve given you
in America where you’ve got good
 
- 
freedom of speech and you got other
freedoms etc. You’re stealing
 
- 
from the country. You’re cheating on the
process by not giving us the backdoor
 
- 
that Congress said we should have”. And
then I said: “Actually we’re a non-profit.
 
- 
We work for the public good”. And then
the conversation basically ended.
 
- 
She had no further thing to say.
applause
 
- 
So part of what we need to do is continue
to make tools that are actually safe
 
- 
as tools. Rather than a lot of the other
systems out there. On the other hand,
 
- 
every funder we’ve talked to
lately has interesting priorities:
 
- 
they wanna pay for censorship-resistance,
they wanna pay for outreach, education,
 
- 
training etc. We don’t have any
funders right now who want to pay
 
- 
for better anonymity. And it’s really
important for some of the people
 
- 
we heard about in the last talk that
they have really good anonymity
 
- 
against really large adversaries.
And I’m not just talking about
 
- 
American Intelligence Agencies. There
are a lot of Intelligence Agencies
 
- 
around the world who are trying
to learn how to surveil everything.
 
- 
So what should Tor’s role be here?
 
- 
There are a lot of people in the Tor
development community who say:
 
- 
“What we really need to do is
focus on writing good code,
 
- 
and we’ll let the rest of the world
take care of itself.” There is also
 
- 
a trade-off from some of the
funders we have right now.
 
- 
Where I could go up and I could say
 
- 
a lot of really outrageous
things that I agree with
 
- 
and that you agree with. But some
of our funders might wonder
 
- 
if they should keep funding us after
that. So part of what we need to do
 
- 
is get some funders who are more
comfortable with the messages
 
- 
that everybody here would like the
world to hear. So if you know anybody
 
- 
who wants to help provide actual
freedom we’d love to hear from you.
 
- 
Jacob: And it’s important to understand
that we sort of have an interesting place
 
- 
in the world at the moment
where it’s easy to say
 
- 
that we shouldn’t be political. And that
in general, there shouldn’t be politics
 
- 
in what we’re doing. And
it’s also easy to understand
 
- 
that that’s crazy when someone
says that to an extent. Because
 
- 
the idea of having free speech, having
the right to read, having the ability
 
- 
to reach a website that is beyond
of the power of the state
 
- 
– that is a very political thing for
many people. And it is often the privilege
 
- 
of some, where they don’t even
realize that’s a political statement.
 
- 
applause
And they suggest…
 
- 
and that they suggest that we don’t need
to be political. We need to recognize the
 
- 
political context that we exist in. And
especially after the summer of Snowden,
 
- 
understanding that there
are almost no tools
 
- 
that can resist the NSA
and GCHQ. Almost none.
 
- 
We did not survive completely
in the summer of Snowden.
 
- 
They were able to get some Tor users.
But they couldn’t get all Tor users!
 
- 
That’s really important. We change
the economic game for them.
 
- 
And that, fundamentally,
is a political issue!
 
- 
applause
 
- 
But please note that the solution
is not a Partisan solution.
 
- 
Where we say: well, some people
are good and some are bad.
 
- 
You guys over there, on the left
or on the right, you don’t deserve
 
- 
to have freedom of speech. You
don’t have the right to read.
 
- 
We aren’t saying that. We’re saying that
the common good of everyone having
 
- 
these fundamental rights
protected in a practical way
 
- 
is an important thing for us to build
and for all of us to contribute to,
 
- 
and for every person to
have. That is, I think,
 
- 
the best kind of political solution
we can come up with.
 
- 
Though it is a very controversial
one in some ways. I think that
 
- 
we can’t actually do it unless everyone
really starts to agree with us.
 
- 
And we are making a lot of positive change
in this. As we saw with the network graph.
 
- 
But this comes from
Mutual Aid and Solidarity.
 
- 
Which most of the people
in this room provide.
 
- 
Roger: And that diversity of
users is actually technically
 
- 
what makes Tor safe. You need to have
 
- 
activists in various countries,
and folks in Russia right now,
 
- 
and law enforcement around the
world. You need to have them all
 
- 
in the same network. Otherwise
if I see that you’re using Tor,
 
- 
I can start guessing why you’re using
Tor. So we need that diversity
 
- 
of users. Not just for
a perception perspective
 
- 
but for an actual technical perspective.
We need to have all the different
 
- 
types of users out there blending
into the same system
 
- 
so that they can keep each other
safe. So part of the hobbies
 
- 
that each Tor person has,
we’re all getting better
 
- 
at outreach to various communities.
So, I mentioned earlier
 
- 
that I talked to law enforcement to try
to teach them how these things work.
 
- 
Turns out that having Jake talk to
law enforcement is not actually
 
- 
the most effective way to
convince them of things
 
- 
laughter
so…
 
- 
Jacob: I’m, I’m, I’m, eh, you know, my
lawyer gave me some great advice
 
- 
which I can tell you without breaking the
privilege of our other communications.
 
- 
Which he says: “never miss the
chance to shut the fuck up!”
 
- 
laughter
And that I think really really underscores
 
- 
why I should not talk to the Police
about why they also need
 
- 
traffic analysis resistance, reachability,
network security, privacy and anonymity.
 
- 
Roger’s much much more diplomatic.
 
- 
Roger: So at the same time we have
people talking to domestic violence
 
- 
and abuse groups and teaching them
how to be safe. And at the same time
 
- 
we have folks at corporations
learning how to be safe online.
 
- 
We hear from large companies
who are saying: “I want to
 
- 
put the entire corporate
traffic over Tor
 
- 
because we actually do have adversaries
and they actually are spying on us
 
- 
and they do want to learn what we’re
doing. So how do we become safe
 
- 
from these situations?” So part of
what we need is help from all of you
 
- 
to become outreach for all of your
communities. And get better
 
- 
at teaching people about why privacy
is important for the communities
 
- 
that you’re talking to and learn how to
use their language and convince them
 
- 
that these things are important.
And at the same time teach them
 
- 
about the other groups out there who
care. So that they can understand
 
- 
that it’s a bigger issue than just
whatever they’re most focused on.
 
- 
Okay, so, a while ago I wrote up
a list of 3 ways to destroy Tor.
 
- 
The first way – we have
a handle on it for a while.
 
- 
The first way is: change the laws
or the policies or the cultures
 
- 
so that anonymity is outlawed.
And we’re pretty good
 
- 
at fighting back in governments
and policy and culture etc.
 
- 
and saying: “No, there are good uses of
these things, you can’t take them away
 
- 
from the world”. The second way:
Make ISPs hate hosting exit relays.
 
- 
And if more and more ISPs say:
“No, I’m not gonna do that”
 
- 
then eventually the Tor Network
shrinks reducing the anonymity
 
- 
it can provide because there’s not as
much diversity of where you might
 
- 
pop out of the Tor Network to go to
the websites. So I think we’re doing
 
- 
pretty well fighting that fight.
We’ve known about it for a while.
 
- 
It’s one we’ve been focusing on
for a long time. Torservers.net
 
- 
and a lot of other groups are doing great
work at building and maintaining
 
- 
relationships with ISPs. But the third
one is one that we haven’t focused on
 
- 
as much as we should. Which is:
make websites hate Tor users.
 
- 
So a growing number of
places are just refusing
 
- 
to hear from Tor users
at all. Wikipedia did it
 
- 
a long time ago. Google gives
you a captcha if you’re lucky…
 
- 
Jacob: That’s the best question, ever!
If you like, that’s a good setup!
 
- 
Roger: I’ll cover this one next. So,
 
- 
Skype is another interesting example
here. If you run a Tor exit relay
 
- 
and you try to skype with somebody
Microsoft hangs up on you.
 
- 
And the reason for that is not that
they say: “Oh my god, Tor people
 
- 
are abusing Skype!” – Microsoft pays
some commercial company out there
 
- 
to give them a blacklist, they don’t even
know what’s on it, and the company
 
- 
puts Tor exit IPs on it. And
now Microsoft blacklists all the
 
- 
Tor exit relays. And they don’t even know
they’re doing it. They don’t even care.
 
- 
So as more and more of these
blacklisting companies exist
 
- 
we’re more and more screwed.
So we need help trying to
 
- 
learn how to teach all of these
companies how to accept
 
- 
users without thinking that IP addresses
are the right way to identify people.
 
- 
Jacob: There might also be,
on point 3, a relationship here
 
- 
with some of the other
points here. E.g. point 4.
 
- 
Which is to say that when
a company does not want to
 
- 
give you location anonymity
maybe there’s a reason for that.
 
- 
I mean, I personally think that Wikipedia
is great, I don’t feel so great
 
- 
about yelp and about Google, most of
the time. And I definitely don’t feel good
 
- 
about Skype. Given what we’ve
learned it makes sense
 
- 
that they would demonstrate that
they do not respect you as users.
 
- 
And the Tor Network as a way to
protect users from them, actually.
 
- 
And some of these places will
say that it's basically only being
 
- 
used for abuse. Often they won’t have
metrics for it. And they will refuse
 
- 
to work with us to come up with inventive
solutions, like e.g. something
 
- 
where you have to use a
nym system of some kind,
 
- 
in the case of Wikipedia, or something
where you solve a captcha, something
 
- 
where you have to have an account,
something where you’re pseudononymous.
 
- 
But you get to retain location privacy.
And actually, in a few cases,
 
- 
it’s probably better that Tor is blocked
because they don’t even
 
- 
provide secure logins when you’re not
using Tor. So it’s not necessarily
 
- 
always a good thing to use the services,
anyway. So in a sort of funny sense
 
- 
it could be helpful that they’re blocking
Tor. But we would like to improve
 
- 
those things. And one thing is
to show that we need to build
 
- 
some systems to get these properties. And
we need to show that it is the best thing
 
- 
right now that we all can use. And
we need people that are working
 
- 
with these companies, with these
communities, to actually help us
 
- 
to understand how we can
better serve Tor community,
 
- 
but also the Tor community that
overlaps with their community.
 
- 
Especially Wikipedia. For me personally,
it kills me that the way that I get
 
- 
to edit the Wikipedia, should I edit
it, is that I have to send an email
 
- 
to someone, tell them an account I already
have, ask them to set a special flag
 
- 
in the Wikipedia database,
and then I can log in and edit.
 
- 
That’s not really the ideal solution,
I think. If I’m not being abusive
 
- 
on Wikipedia I should be able to
have a pseudononymous way to edit.
 
- 
I should be able to anonymously connect.
And I should be able to do that
 
- 
from anywhere in the world, especially
when the local network is censoring me
 
- 
and my only way to get to the
Wikipedia is to, in fact, use Tor
 
- 
or something like it.
applause
 
- 
So, the last point on that is this one:
I obviously joked the church man (?)
 
- 
Roger: Yeah, so I was showing this to an
anonymity researcher and he started
 
- 
yelling: “IPO, IPO, IPO, IPO…” as
soon as he saw this graph of Tor users
 
- 
over time. So in the course of a week
or so we added about 4 or 5 million
 
- 
Tor clients to the network.
And you’d think: “Oh wow,
 
- 
this Snowden thing worked,
it’s great!” But actually,
 
- 
some jerk in the Ukraine signed
up his 5 million node botnet.
 
- 
Jacob: I mean, one of the good things
about this is that we learned that
 
- 
the Tor Network scales to
more than 5 million users.
 
- 
Roger: We’ve been working on
scalability: it works!
 
- 
applause
 
- 
Jacob: We had to make some changes.
There’s e.g. the NTor handshaking
 
- 
which is using elliptic curves. That is
something which really helps to reduce
 
- 
the load on the relays. This is a pretty
big change. But there’s a lot of work
 
- 
that Mike Perry has done with load
balancing, lots of work by Nick Mathewson.
 
- 
Lots of changes in the Tor Network
for scalability. But if this had been
 
- 
like a real attacker, or if the botnet had
been turned against the Tor Network,
 
- 
it probably would have been fatal,
I think. A really interesting detail is
 
- 
that this was a botnet for Windows.
And Microsoft has the ability to remove
 
- 
things that they flag as malicious.
And so they were going around
 
- 
and removing Tor clients from
Microsoft Windows users
 
- 
that were part of this botnet. Now when we
talked to them, my understanding is that
 
- 
they only removed it when they were
certain that is was a Tor that came
 
- 
from this botnet. That’s a lot of power
that Microsoft has there, though!
 
- 
If you’re using Windows, trying to be
anonymous, with the device. Bad idea.
 
- 
Roger: They actually removed the
bot and left the Tor client because
 
- 
they weren’t sure whether they
should remove it. So actually
 
- 
all those 5 millions are
still running Tor clients.
 
- 
Jacob: Whhoops! So, interesting
point here, summer of Snowden.
 
- 
It’s hard to tell. There’s
some piece of information
 
- 
that we’re really missing here. Due to
the botnet happening at the same time
 
- 
it’s really difficult to understand the
public response to the revelations
 
- 
about NSA and spying.
Especially now. I mean:
 
- 
we think that most of that is
botnet traffic. Over a million.
 
- 
Over a million, where it goes
up. Over almost a 6 million.
 
- 
So that’s a serious amount
of traffic, from that botnet.
 
- 
And that is a really serious threat to
the Tor Network. It can be (?)
 
- 
a couple of different ways. One of
these things, I mentioned before,
 
- 
NTor handshake. But another thing
is: if every person in this room
 
- 
were to run a Tor relay, even
a middle relay not an exit relay,
 
- 
it would make it significantly harder to
melt the Tor Network.
 
- 
I actually think
 
- 
that would be incredible if you guys
would all do that.
 
- 
I don’t think that
all of you will.
 
- 
But if you did that would
make it so that we could survive
 
- 
other events like this in the future.
 
- 
applause
 
- 
So someone sent a question which we’re
just gonna go ahead and answer now.
 
- 
“When talking of funding for better
anonymity, what do you think,
 
- 
in terms of money,
how much could you need?”
 
- 
Well here’s a thing:
 
- 
if you were willing to fund us
we would really like you.
 
- 
Or I would really like it
 
- 
especially, since I’m probably the one
that threatens the US Government funding
 
- 
of Tor, more than any person in this room.
 
- 
I think that it would be great if you
could match the Dollar-to-Dollar
 
- 
that Government funders
bring to the table.
 
- 
We would really like that.
 
- 
It would be amazing if that was possible.
 
- 
So there’s actually a hard number
 
- 
on the website.
 
- 
Or if you wanted to
– as much money as you have.
 
- 
laughter
Feel free!
 
- 
Either way –
 
- 
Roger: To give you a sense of
scale: right now our 2014 budget
 
- 
is looking like it will be somewhere
between 2 Mio US and 3 Mio US,
 
- 
which is great except we’re trying to
do so many different things at once.
 
- 
If it ends up on the 2 Mio US side
we basically have no funding
 
- 
for making anonymity better.
 
- 
If it ends up
more than that then
 
- 
we’re in better shape and
we can make people more safe.
 
- 
Jacob: And part of the thing is that we
have to build all sorts of tools that are
 
- 
not directly related to Tor.
 
- 
In many cases.
 
- 
Especially because of the funding.
 
- 
But because we want users to be
able to actually use the software
 
- 
with something else.
 
- 
It’s not nearly
enough to have a Tor.
 
- 
You need to be able
 
- 
to do something with the Tor.
 
- 
You know?
 
- 
And that’s a really difficult part.
 
- 
But if there’s specific things we would
also be open to alternate funding models
 
- 
where we fund very specific tasks e.g.
that would be a really great thing.
 
- 
We haven’t really
experimented with that.
 
- 
But on that note I wanted to talk
about classified information.
 
- 
Everybody ready?
It’s not classified any more,
 
- 
it’s on the internet?
I’m not sure. So,
 
- 
this is probably the hot topic
I would say.
 
- 
Probably the one
everyone wanted to know about.
 
- 
So the NSA and GCHQ
 
- 
have decided that they
don’t like anonymity,
 
- 
and they’re doing everything that
they possibly can to attack it.
 
- 
With a few exceptions.
 
- 
So there’re
a few different programs
 
- 
– I’m gonna talk a lot about this
on Monday. So I don’t wanna go
 
- 
into too much detail about the
non-Tor aspects of it. But
 
- 
for the Tor side of it – Quick Ant is
what’s called a question-filled data set.
 
- 
This is a QFD.
 
- 
What that means is it’s TLS related
sessions, as I understand it.
 
- 
And it is recording data, i.e.
Data Retention about TLS sessions.
 
- 
It’s pulled from a larger thing –
Flying Pig.
 
- 
Which was revealed on I think,
a Brazilian Television clip, or someone
 
- 
photographed a moving
picture of Glenn’s screen.
 
- 
That program is kind of scary.
But not too scary.
 
- 
Just looks like after the fact (?) Data
Retention.
 
- 
Quantum Insert
 
- 
on the other hand is a pretty
straightforward man-on-the-side-attack.
 
- 
Foxacid, which is another thing which
we know that’s used against Tor users,
 
- 
is basically just the ‘Tailored Access
and Operations’ web server farm
 
- 
where they serve out malware.
 
- 
Sort of like a watering hole attack.
Except
 
- 
in this case they also combine it with
Quantum Insert.
 
- 
So that when you visit
 
- 
your Yahoo mail
– NSA and GCHQ love Yahoo –
 
- 
even when you use Tor
they basically redirect you
 
- 
by just tagging a little bit of data
into the TCP connection. And
 
- 
of course Tor does its job, it flows all
the way back to you.
 
- 
Your web browser
then loads it.
 
- 
You’re now connected to
their server.
 
- 
Their server delivers
malicious code.
 
- 
And the use it
is to pop somebody.
 
- 
From what I understand it took
them 8 months to hit one guy.
 
- 
That’s fucking great, I think, that
we went from ‘everybody all the time
 
- 
applause
being compromisable’ to ‘they have to
 
- 
very carefully pick one person
and work for a long time’.
 
- 
They really believe that
that’s the right target.
 
- 
They really understand that
 
- 
that is someone that they
want to go after. And
 
- 
if that person were to keep their browser
up-to-date they probably would have been
 
- 
ahead of the game.
Not exactly sure.
 
- 
But there are some other things
that are really dangerous.
 
- 
Which is
Quantum Cookie, e.g. Quantum Cookie
 
- 
is a program where basically
they’re able to elicit
 
- 
from a connection other connections
from your web browser
 
- 
which will get you to
leak cookie information.
 
- 
So let’s say you happen to
log-in to a Yahoo account.
 
- 
And that was a known
selector for surveillance.
 
- 
And then they thought you might also have
a Gmail cookie that wasn’t marked secure
 
- 
and you might also have another
search engine; or you might have
 
- 
some other cookies.
 
- 
Then they would
basically insert things that your browser
 
- 
will then request insecurely over the same
connection, to (?) tie them together,
 
- 
correlate that.
 
- 
And then they will extract
it and they’ll be able to tell that
 
- 
this selector is linked to
these other selectors.
 
- 
’Cause they basically been able
to actively probe.
 
- 
A solution to that is
‘Https Everywhere’ which we already ship
 
- 
in the Tor Browser Bundle
but also to be aware about
 
- 
session isolation to maybe
even if you’re using things
 
- 
where you’re trying to it as securely as
possible – not every site will offer TLS
 
- 
to actually make sure that the
Tor browser only has the exact
 
- 
set of credentials you need for the thing
you’re doing at that time.
 
- 
So that’s
 
- 
incredibly straight-forward stuff.
 
- 
In terms of the hacker
community this is like
 
- 
not even really interesting, actually.
 
- 
The thing that makes it interesting is
 
- 
that they do it at internet scale.
 
- 
And that they’re trying to watch
 
- 
the entire internet all the time.
 
- 
Another interesting fact about this is
 
- 
that you would imagine that not
routing through Five Eyes countries
 
- 
would make you safer in some way.
 
- 
I don’t think that’s actually true.
 
- 
From what I can tell they actually
have some restrictions, if you route
 
- 
through the Five Eyes countries.
 
- 
And if you are not in
a Five Eyes country,
 
- 
like Germany, they have no restrictions.
 
- 
So if you behave differently we know
from an anonymity perspective
 
- 
that that’s worse for you.
 
- 
And if you behave differently
in this particular way
 
- 
then there are legal answers that
show that you shouldn’t break out
 
- 
from the regular way that Tor
users and Tor clients behave.
 
- 
But the key point to take home is
that every single person here
 
- 
has the same set of problems
if they’re not using Tor.
 
- 
And it is easier for them.
 
- 
So that’s a huge,
huge difference.
 
- 
And the last point, I think is a key one
which Roger has a great story for.
 
- 
Roger: Yeah, so they… the story
here is they look at Tor traffic
 
- 
coming out of Tor exit relays.
 
- 
They don’t know who the person is.
And they have
 
- 
to make a decision there: do I try the
Quantum Insert and the Foxacid,
 
- 
do I try to break into their browser?
Or do I leave them alone.
 
- 
And when they see the Tor flow
they don’t know who it is.
 
- 
So on the one hand, that’s great.
 
- 
They can’t do target attacks.
 
- 
They have to do broad
attacks and then
 
- 
check/wait (?) later to see whether
they broke into the right person.
 
- 
But as soon as the Guardian
articles went up about this,
 
- 
DNI – the something National Intelligence
– put out a press release, saying:
 
- 
“We’d like to assure everybody
that we never attack Americans”.
 
- 
Jacob: So first of all – on behalf of
the American people and the US Government
 
- 
which I do not represent:
I’m so sorry that
 
- 
my country keeps embarrassing the rest
of the reasonable Americans, of which
 
- 
there are plenty, many of us that are not
James Clapper, that total fucking asshole.
 
- 
applause
 
- 
to Roger:
We have 5 minutes.
 
- 
applause
 
- 
Roger: So the reason why that story is
particularly interesting is that: I talked
 
- 
to an actual NSA person a couple of weeks
ago… and I’m like: “Wait, you never attack
 
- 
Americans but you have to blank-and-attack
everybody and then find out who it was”.
 
- 
And he said: “Oh no no no no, we watch
them log into Facebook and if they log in
 
- 
as the user we’re trying to attack
then we attack them.
 
- 
No problem.”
 
- 
Jacob: And they do the blanket
dragnet surveillance. So,
 
- 
an interesting point of course is that we
always heard…
 
- 
I once met someone
 
- 
who explained to me: “The NSA obviously
runs lots of Tor nodes like they were
 
- 
like 90.000 Tor nodes”,
I think was the number.
 
- 
I wish we had 90.000 Tor nodes.
That’d be incredible.
 
- 
You know
we’re like, what, at about 4..5000
 
- 
at any given point in time, that are
stable, of which are 1/3 are exit relays.
 
- 
Right.
 
- 
So it turns out when the NSA did
run some, they ran half a dozen.. a dozen?
 
- 
Roger: They ran about 10.
 
- 
And they
were small.
 
- 
And short-lived.
 
- 
On EC2.
 
- 
But that should not
make you happy.
 
- 
It doesn’t matter
 
- 
whether the NSA runs Tor relays.
 
- 
They can watch your Tor relays.
 
- 
If you run a Tor relay at a
great place anywhere in the US
 
- 
or Germany or wherever they’re good
at spying on they watch the upstream
 
- 
of your relay and they get almost
what they would get from running
 
- 
their own relay.
 
- 
So what we should be
worried about – we should not be worried
 
- 
that they’re running relays.
 
- 
It’s a concern, but the
bigger concern is
 
- 
that they’re watching the whole internet.
 
- 
And the internet is much more centralized
 
- 
than we think it is.
 
- 
There are a lot more
bottle-necks where if you watch them
 
- 
you get to see a lot of
different Tor traffic.
 
- 
So the problem is not so much
 
- 
“Are they running relays?” as “How
many normal relays can they watch?”
 
- 
And if you’re thinking about a large
adversary like NSA: the answer could be:
 
- 
“A third?”, “Half?”.
 
- 
We don’t know
how many deals they have.
 
- 
Jacob: So, an interesting point here is
that one-hop-proxies are… or VPN
 
- 
– who here uses a VPN to some
kind of commercial VPN service?
 
- 
about 1/4 raised hands
Right.
 
- 
So this is a pretty big problem,
 
- 
I think.
 
- 
Which is that you end up with the
hide-my-ass problem.
 
- 
Which is that –
 
- 
first of all that company, it’s a problem.
 
- 
Second of all, what they do to their users
 
- 
is also a problem.
 
- 
Which is that they
basically promote their service
 
- 
for revolution in Egypt, e.g. but when
someone used it because they disagreed
 
- 
with the policies of the UK then
they turned them over.
 
- 
Interesting point.
 
- 
We need to build decentralized systems
where they can’t make that choice.
 
- 
We need to make sure that that
isn’t actually happening.
 
- 
And one of the things
 
- 
that we’re trying to drive home is
that – and I really think it’s important
 
- 
to take this to heart –
one-hop-proxies or VPNs,
 
- 
as we have said for more that a
decade, are not safe. Especially
 
- 
if you think about when they from the
QuickANT and from the Flying Pig software,
 
- 
they’re recording traffic
information about connections.
 
- 
And in some cases
 
- 
we know – thanks to Laura Poitras
and James Risen – that they have
 
- 
Data Retention which is something
like – what is it, 10..15 years,
 
- 
5 years online, 10 years
offline, is that right?
 
- 
Right. Okay.
That’s bad news.
 
- 
We know that the math
for VPNs is not in your favor.
 
- 
So that said: What
happens with this stuff?
 
- 
Right?
 
- 
What happens is what happened
e.g. with the Silk Road fellow.
 
- 
Or maybe not.
It’s not clear.
 
- 
It could be that the guy used a VPN.
 
- 
Which is braindead.
But it could also be that
 
- 
the NSA has this data and tried
to pull off a retractive attack
 
- 
once they already had him from
other things like auguring fake IDs.
 
- 
We don’t know which in the case
of Silk Road.
 
- 
But we can tell you
 
- 
that it’s pretty clearly a bad
idea to do it if you’re going to
 
- 
do something interesting.
 
- 
It’s probably also a bad
idea to do it just generally
 
- 
because you don’t even know what
’interesting’ is in 5 or 10 years. So
 
- 
parallel construction is a really
serious problem, and we think,
 
- 
probably, if we could expand the
Tor Network, we would make it
 
- 
significantly harder to do this.
 
- 
It would
make it significantly harder for them
 
- 
to do it, especially if you replace your
VPN with Tor.
 
- 
There are some trade-offs
 
- 
with that, though.
 
- 
So the real question is
what your threat model is.
 
- 
And you really
have to think about it.
 
- 
And then also understand
that we live in a world now
 
- 
where Law Enforcement and
Intelligence Services, they seem to be
 
- 
blending together.
 
- 
And they seem to be blending
together across the whole planet
 
- 
in secret.
 
- 
Which is a serious problem
for the threat model of Tor.
 
- 
Roger: So I actually talked to
some FBI people and I said:
 
- 
So which one of these is it?
 
- 
And they said: Well, we
never get tips from the NSA.
 
- 
We’re good, honest Law enforcement,
they’re doing something bad,
 
- 
but why should that affect us?
 
- 
And my response was: “Well,
NSA says they told you!
 
- 
So, are you lying
to me or are they lying to you?
 
- 
Or what’s going on here?”
 
- 
And I don’t actually
know the right solution here.
 
- 
So scenario 1: The NSA
anonymously tips the FBI
 
- 
and they go check something out and
they say: “Well I need to build a case
 
- 
that they do”.
 
- 
Scenario 2: Some anonymous
whistleblower tips off the FBI
 
- 
and they go build a case.
 
- 
From the FBI’s perspective
these are the same:
 
- 
“I got a tip, I build a case.
 
- 
Why should I care where
it came from?” And
 
- 
so should we build a Know-your-customer
Law so that the FBI has to know
 
- 
their informers or whistleblowers?
 
- 
Should we rely on the NSA
 
- 
to regulate itself?
 
- 
Should we rely
on the Congress to regulate NSA?
 
- 
None of these are good answers.
 
- 
Jacob: So, we have a very
limited amount of time.
 
- 
And in order to be able
 
- 
to address some questions we
will probably skip a few things
 
- 
and we’ll put these slides
online.
 
- 
But short/quick
 
- 
summaries for a few of these slides, then
we’re gonna address some questions.
 
- 
One of them is that we want to improve
Hidden Services.
 
- 
Even though they
 
- 
haven’t been broken as far as we
understand from any of the documents
 
- 
that have been released.
 
- 
We still
want to make them stronger,
 
- 
because we wanna be ahead of the game.
 
- 
We don’t want to play Catch-Up.
 
- 
Roger: We especially need to improve
the usability and performance of them.
 
- 
Because right now they’re a toy
that only really dedicated people
 
- 
get working.
 
- 
And the more
mainstream we could make them
 
- 
the more broad uses we are going to see.
 
- 
The reason why people keep hearing
 
- 
about high-profile bad Hidden Services
is that we don’t have enough
 
- 
good use cases in action yet that
lots of people are experiencing.
 
- 
Jacob: The most important thing for all of
the – let’s say – Cypherpunks movement
 
- 
to understand is that when
you have usable crypto
 
- 
you are doing the right thing.
 
- 
When
you have strong peer-reviewed
 
- 
Free Software to implement that, and
it’s built on a platform where you can
 
- 
look at the whole stack you’re
really ahead of the game.
 
- 
There’s a lot to be done in that.
 
- 
And if we do that
for Hidden Services
 
- 
I think we’ll have similar returns that
you’ll see with other crypto projects.
 
- 
Roger: So one of the other great things in
the Tor world is the number of researchers
 
- 
who are doing great work at evaluating
and improving Tor’s anonymity.
 
- 
So there are a couple of papers that were
out over the past year talking about
 
- 
how we didn’t actually choose the
right guard rotation parameters.
 
- 
I’m not going to get into that in detail
in our last couple of minutes.
 
- 
But the very brief version is:
 
- 
if you can attack both sides of the
network and they run 10% of the network
 
- 
– they, the adversary run 10% of the
network – the chance over time,
 
- 
the blue line is the current situation,
where you choose 3 first hops,
 
- 
3 entry guards and you rotate every
couple of months – over time
 
- 
the chance that you get screwed by an
adversary who runs 10% of the network
 
- 
is pretty high.
 
- 
But if we change it
to 1 guard and you don’t rotate
 
- 
then we’re at the green line which
is a lot better against an adversary
 
- 
who’s really quite large.
 
- 
This is an adversary
larger than torservers.net
 
- 
e.g. So A...
 
- 
Jacob: Arts (?) is no adversary, right?
 
- 
Roger: So a pretty large attacker we
need to move it from the blue line
 
- 
down to the green line.
 
- 
And that’s
an example of the anonymity work
 
- 
that we need to do.
 
- 
-- So, what’s next?
 
- 
Tor, endorsed by Egyptian activists,
 
- 
Wikileaks, NSA, GCHQ, Chelsea
Manning, Edward Snowden…
 
- 
Different communities like
Tor for different reasons.
 
- 
Some of our funders we go to them with
that sentence – basically everybody
 
- 
we go to with that sentence.
 
- 
It’s like:
“I like those 3 examples but I don’t like
 
- 
those 2 examples”.
 
- 
So part of what we
need to do is help them to understand
 
- 
why all of these different
examples matter.
 
- 
Jacob: That said, I tend to believe
that we need to be engaged
 
- 
in a pretty big way and thanks
to the people of Ecuador,
 
- 
especially the people running the Minga-tec
community events, they have actually
 
- 
put together a real model which
should be emulated probably
 
- 
by the rest of the world where they really
engage with civil society, and they’re
 
- 
actually able to arrange for meetings
with e.g. the Foreign Minister
 
- 
or with various other people involved in
the National Assembly.
 
- 
And as a result
 
- 
they had Article 474, which they
proposed, which was basically
 
- 
the worst Data Retention
Law you can imagine.
 
- 
It included video taping
 
- 
in Internet Cafés, 6 months dragnet
surveillance, all sorts of awful stuff.
 
- 
And they were able to, in the
course of, I would say 3..6 months,
 
- 
this is mostly the FLOK Society,
actually.
 
- 
They were able to organize
 
- 
a real discussion about this.
 
- 
And we
were able to get this proposed part
 
- 
of the penal code completely removed.
 
- 
At the end of November of last year…
 
- 
early December… of this year.
 
- 
So just about a month ago.
 
- 
So if we really work together
across the spectrum,
 
- 
we see, right now, in Ecuador
e.g. changing (?) away
 
- 
by showing them that fundamentally:
the game is rigged.
 
- 
If you choose
 
- 
to spy on your citizens then the NSA
always wins.
 
- 
And the NSA wants people
 
- 
to believe that everybody is doing
the spying.
 
- 
So one of the things
 
- 
I explained to people in the Ecuadorian
Government and in Ecuadorian civil society
 
- 
is that you can choose a different game.
 
- 
You can choose not to play that game.
 
- 
The only people that win when you
choose that game are the NSA,
 
- 
and potentially you
– a few times.
 
- 
But the NSA will get
 
- 
whatever data you
have stored away.
 
- 
If you want to be secure
 
- 
against the dragnet surveillance, if
you want to be secure against people
 
- 
who will break into that system you
must not have that system in existence.
 
- 
You must choose a different paradigm.
 
- 
And when I told this to people in Ecuador
 
- 
and they understood the trade-offs,
and they understood that they are
 
- 
not the best at surveilling
the whole planet.
 
- 
They understood that they’re
 
- 
not the best in internet security yet.
 
- 
They realized that the game is rigged.
 
- 
And they got rid of Article
474 from the penal code.
 
- 
And there is no Data Retention
there in that penal code now.
 
- 
applause
 
- 
But I have to stress this not
because of 1 or 2 or 10 people,
 
- 
it’s because of a broad
civil society movement.
 
- 
Which is what we’ve also seen
 
- 
in Germany, and in other places.
 
- 
So this is something which you
should have a lot of hope about.
 
- 
It’s not actually
dark everywhere.
 
- 
We are actually making
positive steps forward.
 
- 
Roger: So there are other tools
that we would like help with.
 
- 
E.g. tails is a live CD, WiNoN and
other approaches are trying
 
- 
to add VM to it, so that even if
you can break out of the browser,
 
- 
there’s something else you have
to break out, other sandboxes.
 
- 
And there are
 
- 
a lot of other crypto improvements that
we’re happy to talk about afterwards.
 
- 
The Tor Browser Bundle, the new one, has
a bunch of really interesting features.
 
- 
Deterministic Builds is
one of the coolest parts of it.
 
- 
Where everybody here can
 
- 
build the Tor Browser Bundle and end up
with an identical binary.
 
- 
So that you can
 
- 
check to see that it
really is the same one.
 
- 
And here’s a screenshot
 
- 
of the new one.
 
- 
It no longer has
Vidalia in it, it’s all just a browser
 
- 
with a Firefox extension that
has a Tor binary and starts it.
 
- 
So we’re trying to stream-line it
and make it a lot simpler and safer.
 
- 
I’d love to chat with you afterwards about
the core Tor things that we’re up to
 
- 
in terms of building the actual program
called Tor but also the Browser Bundle,
 
- 
and metrics, and censorship
resistance etc.
 
- 
And then, as a final note:
We accept Bitcoin now.
 
- 
Which is great.
applause
 
- 
Jacob: So all of the Bitcoin
millionaires in this community:
 
- 
we would really encourage you to help us
get off of the US Government funding.
 
- 
Don’t just complain, help us!
 
- 
Mutual Aid
and Solidarity means exactly that:
 
- 
to put some money where
your mouth is!
 
- 
We’d really like to do that.
 
- 
And it’s really important to show people
that we have alternative methods
 
- 
of funding community-based
projects.
 
- 
So think about it
 
- 
and you can, if you’d like, use Bitcoin.
 
- 
Roger: A last, right now, BitPay is
limiting you to 1000 Dollars of Bitcoin
 
- 
per donation.
 
- 
We’re hoping to lift
that in the next couple of days.
 
- 
But if you would like to give us lots of
Bitcoins, please don’t get discouraged.
 
- 
And then, as a final note: starting
right now in Noisy Square
 
- 
is an event on how to help Tor and there
will be a lot of Tor people there,
 
- 
and we’d love to help teach you
and answer your questions
 
- 
and help you become part of the community.
 
- 
We need you to teach other people
 
- 
why Tor is important.
 
- 
Jacob: Thank you!
 
- 
applause
 
- 
no time for Q&A left
 
- 
*Subtitles created by c3subtitles.de
in the year 2016.
 
- 
Join and help us!*
 
              
            
Andi
Revision 4 was an tex import from the pad with automated sync support. As some parts in the middle are missing the text of revison 5 is out of sync, starting from minute 10.