and if you can get the guard and exit node for a clearnet connection and the guard, rendezvous point and exit for the onion service that can be enough.
You ignored a substantial portion of the reply. “That can be enough”... yet it has not been. It’s actually very difficult to perform correlation attacks in a complex network, especially if the user is generating decoy traffic or passing along relay traffic, and even moreso if the end server is highly active as well. It takes an enormous amount of resources to even determine that someone may be connecting to a specific server, and again just connecting to a specific server often tells you nothing about what the user was specifically doing. So unless you’re hunting down someone selling enriched uranium, major abuse content producers/hosters, or something of that scale, putting in all that investment to gain a fuzzy data point that likely isn’t even useful in an enforcement context is just not worth the tradeoff.
Come back when you have evidence of real-world attacks and not just FUD against the best current network for anonymity.
> So unless you’re hunting down someone selling enriched uranium, major abuse content producers/hosters, or something of that scale, putting in all that investment to gain a fuzzy data point that likely isn’t even useful in an enforcement context is just not worth the tradeoff.
But I don’t think we disagree. My view is that TOR is inadequate against a nation state attack because for some of these attacks it is easier to do mass de-anonymization and hope you get some particular user or set of users you are interested in. The resources to do this are small for something the scale of an intelligence agency, but excessively large for some local police department.
I’m not sure why you appear so hostile to citing attacks that are well-known and already part of the public threat model.
Even mass deanonymization—which is unlikely to be sustainable long-term in such an adversarial ecosystem—does nothing for you unless you (a) know specifically what you are looking for and (b) are able to either compromise the end server or identify frequent or very large transfers that correspond exactly with known events or data of interest (like specific uploads). There are some countries where the authorities might be allowed to round up anyone who has connected to a server without further information about what they were doing, but despite our declining civil liberties situation, these countries aren’t currently in the West.
There just aren’t that many people who are both legitimate and likely targets of such an attack. And since the most likely actor to be able to afford such an attack (USG) also has practical uses for Tor, IMHO it would be unlikely to do anything that actually threatens the network. I could be misremembering, but I believe the one big successful deanonymization attack was in Europe, not the US, and the approach used there would not have worked to locate an occasional end user of a busy server.
I am not really interested in debating this further. Feel free to respond of course, but it’s obvious to me (and hopefully everyone else) that you have an axe to grind against Tor.
https://github.com/Attacks-on-Tor/Attacks-on-Tor
and if you can get the guard and exit node for a clearnet connection and the guard, rendezvous point and exit for the onion service that can be enough.