Hi @Marc, you touch on a number of points. Iâm glad @FranklyFlawless & @Not_Ambrose are able to talk numbers with you.
I wondered what would happen if such a despot were to invest one billion dollars to undermine the Tor network. Do you think the Tor network would survive this?
Of course the despot would try to sell it to the public as an âinvestmentâ and try to be reimbursed for it, or pay for it directly from the citizens. My guess is there will be little to show for the it.
Would âthe Tor network would survive this?â I agree with both @FranklyFlawless & @Not_Ambrose.
However your use of despot* is vague, so Iâd say if youâre talking about countries, the smaller the country, the more easily those who use the tor network could be found. Determining what they were doing is another matter.
- If the despot owns a sports team, the despot could (for $1B) probably forcibly control (contractual or technological) the playerâs devices to connect to the clubâs wifi, then figure out which team member was connecting to the tor network.
Figuring out who in the stadium of hundreds of thousands would be harder. (Even if offered free Wi-Fi, some percent will just keep using their cell service.) Some people will connect to a VPN first, then connect to tor, thus putting themselves outside of the despot stadium ownerâs reach (we hope).
If you want to get into the specific costs and probabilities, Iâm not the person to say.
But none of this would âundermine the Tor networkâ or cause any damage to its existence.
Depending on the place the despot spends $1 Billion USD, and how much corruption exists among those in charge of spending itâand those hired, it could last a very long time, or it could be gone quicker than the despot expects.
Technological attacks and social engineering attacks are the two main, and even overlapping, attacks the Tor Project, tor network operators, and tor users face.
Perhaps the despot tries to infiltrate/inveigle torâs code by getting a ringer hired or submitting patches. We can hope the Tor Project, and supporters, can catch it ASAP. Because even though itâs open source, my guess is most people understand computer languages about as much as they understand the legalese in contracts and legislation.
Thereâs an analysis/paper/blog post with numbers predicting the costs of attacking the tor network and naming general tiers of attackers. From individuals to nation states. Search the Tor Project blog. (Maybe someone can provide a link.)
The tor network is constantly in flux since anyone can join to be a relay, this is shown through the hourly consensus vote. (IIRC) So percentages of risk(s) are always going to fluctuate.
Here are two resources to learn about tor network health:
True despots care little about proof, and I would say often create evidence out of thin air.
If they hold any sway over the court system, facts get in the way, they donât need to spend a billion dollars to create baffle-them-with-BS evidence to convict someone.
So they will have two projects. One that creates bogus data to remove their detractors, and one that really does try to undermine torâs protections. But the latter project will be secret.
Since past is often prologue, the despot will spend more resources spying on underlings, associates, and educational institutions than on the general population. But since the general population is considered more easily expendable, some will be punished harshly to âsend a messageâ to the former.
Iâve seen a number of âhow to connectâ to the tor network documents, but none recently.
Iâve seen over time the Tor Project change the language (advice/instructions) shown upon opening Tor Browser for the first time. Iâm guessing this is due to it not being safe in some places to start out trying to make a direct connection using a publicly listed relay, but to offer users a chance to connect using a bridge.
Perhaps there should be an update somewhere on approaching using Tor Browser from the most paranoid perspective possible**, then document progressively less troublesome/paranoid/careful methods.
** I donât doubt this is subjective.
Iâm glad there are protections for onion services to protect them against DOS attacks.
For a long time Iâve wished that despots like you describe, who add relays to the network for the purpose of spying/undermining it, could somehow be used and not 100% rejected. As I understand it, they shouldnât be allowed to relay traffic but perhaps they can still be used to bear some of the costs.
Perhaps they could be made to only answer directory requests, or some other slice of the network where theyâre mostly blind but provide a useful service. Of course there would still need to be checks in the tor code since malevolent despots may compile their own modified version of torâŚ