Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Post Office on the brink of collapse

      Post Office on the brink of collapse

      13 March 2026
      New policy direction targets South Africa's municipal broadband logjam - Solly Malatsi

      New policy direction targets South Africa’s municipal broadband logjam

      13 March 2026
      How electronic warfare is threatening ships and their crews

      How electronic warfare is threatening ships and their crews

      13 March 2026
      Rand slumps for second week

      Rand slumps for second week

      13 March 2026
      Parliament opens nominations for Icasa council seats

      Parliament opens nominations for Icasa council seats

      13 March 2026
    • World
      Musk launches Macrohard in cheeky nod to Microsoft - Elon Musk

      Musk launches Macrohard in cheeky nod to Microsoft

      12 March 2026
      Europe is building an alternative to Microsoft Office

      Europe is building an alternative to Microsoft Office

      11 March 2026
      Microsoft bets on Anthropic as it loosens ties with OpenAI

      Microsoft bets on Anthropic as it loosens ties with OpenAI

      10 March 2026
      World hit by worst oil shock since the 1970s

      World hit by worst oil shock since the 1970s

      9 March 2026
      iStore prices MacBook Neo at R11 999 in South Africa

      Apple debuts MacBook Neo to challenge Windows PCs, Chromebooks

      5 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
      TCS+ | Bolt ups the ante on platform safety - Simo Kalajdzic

      TCS+ | Bolt ups the ante on platform safety

      4 March 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Top » Is Tor still secure?

    Is Tor still secure?

    By The Conversation9 February 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Tor-640

    The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software that allows anonymous, untraceable use of the Web, to gather the evidence against him.

    The development of anonymising software such as Tor and Bitcoin has forced law enforcement to develop the expertise needed to identify those using them. But if anything, what we know about the FBI’s case suggests it was tip-offs, inside men, confessions, and Ulbricht’s own errors that were responsible for his conviction.

    This is the main problem with these systems: breaking or circumventing anonymity software is hard, but it’s easy to build up evidence against an individual once you can target surveillance, and wait for them to slip up.

    A design decision in the early days of the Internet led to a problem: every message sent is tagged with the numerical Internet protocol (IP) addresses that identify the source and destination computers. The network address indicates how and where to route the message, but there is no equivalent indicating the identity of the sender or intended recipient.

    This conflation of addressing and identity is bad for privacy. Any Internet traffic you send or receive will have your IP address attached to it. Typically a computer will only have one public IP address at a time, which means your online activity can be linked together using that address. Whether you like it or not, marketers, criminals or investigators use this sort of profiling without consent all the time. The way IP addresses are allocated is geographically and on a per-organisation basis, so it’s even possible to pinpoint a surprisingly accurate location.

    This conflation of addressing and identity is also bad for security. The routing protocols which establish the best route between two points on the Internet are not secure, and have been exploited by attackers to take control of (hijack) IP addresses they don’t legitimately own. Such attackers then have access to network traffic destined for the hijacked IP addresses, and also to anything the legitimate owner of the IP addresses should have access to.

    This is why those looking for cat videos on YouTube on 24 February 2008 found themselves at Pakistan Telecom instead, why hackers made off with $83 000 worth of bitcoin between February and May 2014 by impersonating the legitimate owners, and why hundreds of organisations found their communications mysteriously routed via computers in Belarus and Iceland in 2013.

    Onion routing was developed to correct these mistakes, separating identity and address so that it’s possible to communicate through the Internet without revealing the IP address used. Originally a US Navy Research Laboratory project, the latest implementation of onion routing is known as Tor and is independently developed by the non-profit Tor Project.

    Tor routes Internet traffic through three or more intermediate computers called nodes, which prevents anyone listening in — and any website the traffic connects to — from knowing the source of the traffic or working out who is communicating with whom. Even Tor nodes aren’t individually aware of the details of which user, where, is connecting to what. The first node sees the user’s IP address, the last knows which site is being accessed, but unless both the first and last nodes are controlled maliciously, these two facts won’t be linked.

    Who uses Tor?
    There are all sorts of reasons to use Tor to protect privacy: law enforcement monitoring criminals, firms studying potential takeover targets, those who don’t like advertisers profiling them, or political activists in authoritarian states. An increasing number use Tor to access websites that are blocked in their country, as Tor’s anonymisation prevents the censor’s software from detecting the traffic is destined for a banned website.

    As well as websites on the everyday Internet, Tor allows the creation of hidden services: websites accessed only through the Tor network, of which the Silk Road is an example. This ensures privacy and security by identifying sites not with an IP address and domain name but with a cryptographic key. Without this key, there’s no way for a would-be eavesdropper to impersonate the real website and intercept traffic directed to it. These are represented by a URL ending in .onion — accessed with a Tor-enabled browser, Facebook is at facebookcorewwwi.onion.

    Tor isn’t perfect. It can’t protect traffic that has left the Tor network, for example, where traffic becomes vulnerable to all the usual attacks. The solution to this is end-to-end encryption — preventing monitoring or tampering not only for Tor users but for everyone else on the Internet, too.

    Another potential weakness is flaws in other software used with Tor. The FBI distributed malware to every visitor to a group of hidden services, some of which claimed to distribute child abuse images. The malware exploited a vulnerability in the Firefox web browser in order to send the real IP address of the user and other identifying information back to the FBI.

    It’s been suggested that a flaw in the software behind the Silk Road gave the FBI the breakthrough that let them discover the IP address and so the real location of the Silk Road’s servers. But the lack of detail on this from the FBI, compared to the other evidence gleaned from Ulbricht’s server and laptop computer, has led some to ask whether the FBI used techniques it doesn’t want openly discussed — such as the involvement of the National Security Agency and its vast surveillance infrastructure.

    It could also have been what’s called a traffic confirmation attack, where the entry and exit Tor nodes are compromised or monitored. Our own research has shown that this can allow communications to be de-anonymised, and researchers are working on how to address this — by making it difficult or unlikely for any one person to control the entry and exit nodes, and by reducing the potential damage if this occurs.

    The Internet has come a long way since its beginnings, and simplifications and rationalisations made for good reasons at the time need to be revisited in light of what’s been learned in the 40 years since.

    Conflating addressing and identity is one of these decisions. Tor — useful in its own right — also indicates how the Internet’s architecture should provide strong assurance of identity when needed, and strong privacy when not. Given enough resources, attackers will be able to de-anonymise at least some of Tor’s users, some of the time, but it’s still the best Web privacy solution we have today. The next generation of systems will be better still.The Conversation

    • Steven J Murdoch is Royal Society University research fellow at University College London
    • This article was originally published on The Conversation
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Silk Road Steven J Murdoch The Onion Router Tor Tor router
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleEskom warns of tough week ahead
    Next Article Adapt IT earnings rise 35%

    Related Posts

    US President Donald Trump

    Trump pardons jailed Silk Road founder Ross Ulbricht

    22 January 2025

    Twitter launches on Tor amid Russia crackdown

    10 March 2022

    R16-billion of bitcoin is on the move, with possible ties to Silk Road

    4 November 2020
    Company News
    Households still under big pressure, Altron Fintech index shows

    Households still under big pressure, Altron Fintech index shows

    13 March 2026
    How AI is changing the way we work - Angela Ho, Obsidian Systems

    How AI is changing the way we work

    12 March 2026
    Domains.co.za introduces complete domain protection service

    Domains.co.za introduces complete domain protection service

    12 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Post Office on the brink of collapse

    Post Office on the brink of collapse

    13 March 2026
    New policy direction targets South Africa's municipal broadband logjam - Solly Malatsi

    New policy direction targets South Africa’s municipal broadband logjam

    13 March 2026
    How electronic warfare is threatening ships and their crews

    How electronic warfare is threatening ships and their crews

    13 March 2026
    Rand slumps for second week

    Rand slumps for second week

    13 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}