Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      South Africa's new fibre broadband battle

      South Africa’s new fibre broadband battle

      20 January 2026
      South Africa needs a national 'quantum defence strategy'

      South Africa needs a national ‘quantum defence strategy’

      20 January 2026
      Chinese brands tighten grip on South Africa's used car market

      Chinese brands tighten grip on South Africa’s used car market

      20 January 2026
      Severe geomagnetic storm hits Earth, Sansa confirms

      Severe geomagnetic storm hits Earth, Sansa confirms

      20 January 2026
      Icasa to target Sentech with tougher broadcast pricing rules

      Icasa to target Sentech with tougher broadcast pricing rules

      19 January 2026
    • World
      Taiwan, US strike strategic AI and chip supply-chain pact - TSMC

      Taiwan, US strike strategic AI and chip supply-chain pact

      20 January 2026
      Oracle sued as bondholders allege AI debt plans were hidden - Larry Ellison

      Oracle sued as bondholders allege AI debt plans were hidden

      15 January 2026
      Activists call for X, Grok to removed from app stores - Elon Musk

      Activists call for X, Grok to removed from app stores

      14 January 2026
      Uganda shuts down internet ahead of pivotal election

      Uganda shuts down internet ahead of pivotal election

      14 January 2026
      Taiwan seeks arrest of OnePlus CEO - Pete Lau

      Taiwan seeks arrest of OnePlus CEO

      14 January 2026
    • In-depth
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      DStv dodges channel blackout in last-minute deal with Warner Bros

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
    • TCS

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
    • Opinion
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Top » Is Tor still secure?

    Is Tor still secure?

    By The Conversation9 February 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Tor-640

    The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software that allows anonymous, untraceable use of the Web, to gather the evidence against him.

    The development of anonymising software such as Tor and Bitcoin has forced law enforcement to develop the expertise needed to identify those using them. But if anything, what we know about the FBI’s case suggests it was tip-offs, inside men, confessions, and Ulbricht’s own errors that were responsible for his conviction.

    This is the main problem with these systems: breaking or circumventing anonymity software is hard, but it’s easy to build up evidence against an individual once you can target surveillance, and wait for them to slip up.

    A design decision in the early days of the Internet led to a problem: every message sent is tagged with the numerical Internet protocol (IP) addresses that identify the source and destination computers. The network address indicates how and where to route the message, but there is no equivalent indicating the identity of the sender or intended recipient.

    This conflation of addressing and identity is bad for privacy. Any Internet traffic you send or receive will have your IP address attached to it. Typically a computer will only have one public IP address at a time, which means your online activity can be linked together using that address. Whether you like it or not, marketers, criminals or investigators use this sort of profiling without consent all the time. The way IP addresses are allocated is geographically and on a per-organisation basis, so it’s even possible to pinpoint a surprisingly accurate location.

    This conflation of addressing and identity is also bad for security. The routing protocols which establish the best route between two points on the Internet are not secure, and have been exploited by attackers to take control of (hijack) IP addresses they don’t legitimately own. Such attackers then have access to network traffic destined for the hijacked IP addresses, and also to anything the legitimate owner of the IP addresses should have access to.

    This is why those looking for cat videos on YouTube on 24 February 2008 found themselves at Pakistan Telecom instead, why hackers made off with $83 000 worth of bitcoin between February and May 2014 by impersonating the legitimate owners, and why hundreds of organisations found their communications mysteriously routed via computers in Belarus and Iceland in 2013.

    Onion routing was developed to correct these mistakes, separating identity and address so that it’s possible to communicate through the Internet without revealing the IP address used. Originally a US Navy Research Laboratory project, the latest implementation of onion routing is known as Tor and is independently developed by the non-profit Tor Project.

    Tor routes Internet traffic through three or more intermediate computers called nodes, which prevents anyone listening in — and any website the traffic connects to — from knowing the source of the traffic or working out who is communicating with whom. Even Tor nodes aren’t individually aware of the details of which user, where, is connecting to what. The first node sees the user’s IP address, the last knows which site is being accessed, but unless both the first and last nodes are controlled maliciously, these two facts won’t be linked.

    Who uses Tor?
    There are all sorts of reasons to use Tor to protect privacy: law enforcement monitoring criminals, firms studying potential takeover targets, those who don’t like advertisers profiling them, or political activists in authoritarian states. An increasing number use Tor to access websites that are blocked in their country, as Tor’s anonymisation prevents the censor’s software from detecting the traffic is destined for a banned website.

    As well as websites on the everyday Internet, Tor allows the creation of hidden services: websites accessed only through the Tor network, of which the Silk Road is an example. This ensures privacy and security by identifying sites not with an IP address and domain name but with a cryptographic key. Without this key, there’s no way for a would-be eavesdropper to impersonate the real website and intercept traffic directed to it. These are represented by a URL ending in .onion — accessed with a Tor-enabled browser, Facebook is at facebookcorewwwi.onion.

    Tor isn’t perfect. It can’t protect traffic that has left the Tor network, for example, where traffic becomes vulnerable to all the usual attacks. The solution to this is end-to-end encryption — preventing monitoring or tampering not only for Tor users but for everyone else on the Internet, too.

    Another potential weakness is flaws in other software used with Tor. The FBI distributed malware to every visitor to a group of hidden services, some of which claimed to distribute child abuse images. The malware exploited a vulnerability in the Firefox web browser in order to send the real IP address of the user and other identifying information back to the FBI.

    It’s been suggested that a flaw in the software behind the Silk Road gave the FBI the breakthrough that let them discover the IP address and so the real location of the Silk Road’s servers. But the lack of detail on this from the FBI, compared to the other evidence gleaned from Ulbricht’s server and laptop computer, has led some to ask whether the FBI used techniques it doesn’t want openly discussed — such as the involvement of the National Security Agency and its vast surveillance infrastructure.

    It could also have been what’s called a traffic confirmation attack, where the entry and exit Tor nodes are compromised or monitored. Our own research has shown that this can allow communications to be de-anonymised, and researchers are working on how to address this — by making it difficult or unlikely for any one person to control the entry and exit nodes, and by reducing the potential damage if this occurs.

    The Internet has come a long way since its beginnings, and simplifications and rationalisations made for good reasons at the time need to be revisited in light of what’s been learned in the 40 years since.

    Conflating addressing and identity is one of these decisions. Tor — useful in its own right — also indicates how the Internet’s architecture should provide strong assurance of identity when needed, and strong privacy when not. Given enough resources, attackers will be able to de-anonymise at least some of Tor’s users, some of the time, but it’s still the best Web privacy solution we have today. The next generation of systems will be better still.The Conversation

    • Steven J Murdoch is Royal Society University research fellow at University College London
    • This article was originally published on The Conversation


    Silk Road Steven J Murdoch The Onion Router Tor Tor router
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleEskom warns of tough week ahead
    Next Article Adapt IT earnings rise 35%

    Related Posts

    US President Donald Trump

    Trump pardons jailed Silk Road founder Ross Ulbricht

    22 January 2025

    Twitter launches on Tor amid Russia crackdown

    10 March 2022

    R16-billion of bitcoin is on the move, with possible ties to Silk Road

    4 November 2020
    Company News
    How Norton is protecting digital lives in a hostile online world - Avert ITD Avert IT Distribution

    How Norton is protecting digital lives in a hostile online world

    20 January 2026
    Beyond the hype: trust is the first step to generative AI ROI

    Beyond the hype: trust is the first step to generative AI ROI

    19 January 2026
    New Planet Energy and Span Africa launch landmark solar project

    New Planet Energy and Span Africa launch landmark solar project

    19 January 2026
    Opinion
    AI moves from pilots to production in South African companies - Nazia Pillay SAP

    AI moves from pilots to production in South African companies

    20 January 2026
    ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

    ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

    14 December 2025
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    South Africa's new fibre broadband battle

    South Africa’s new fibre broadband battle

    20 January 2026
    South Africa needs a national 'quantum defence strategy'

    South Africa needs a national ‘quantum defence strategy’

    20 January 2026
    AI moves from pilots to production in South African companies - Nazia Pillay SAP

    AI moves from pilots to production in South African companies

    20 January 2026
    Taiwan, US strike strategic AI and chip supply-chain pact - TSMC

    Taiwan, US strike strategic AI and chip supply-chain pact

    20 January 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}