- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
192 lines
11 KiB
Plaintext
192 lines
11 KiB
Plaintext
Episode: 383
|
|
Title: HPR0383: TOR Interview
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0383/hpr0383.mp3
|
|
Transcribed: 2025-10-07 19:31:02
|
|
|
|
---
|
|
|
|
!
|
|
This is Krasu, I'm at the after-after party at Southeast Linsfest, and I'm talking to
|
|
Wendy from the Onion Router.
|
|
What is the Onion Router?
|
|
Well, the tour project is an instance of onion routing anonymizing software that sends
|
|
traffic through a series of hops on its way to its destination, so that ISPs along the
|
|
way, the destination site, can't figure out who you are and what you're browsing at the
|
|
same time.
|
|
Nice.
|
|
So, I guess the immediate appeal to that is fairly obvious.
|
|
Who uses it?
|
|
I mean, is it just because your paranoid or, I mean, is there...
|
|
Well, it's anyone who wants to avoid traffic analysis of their activity, and that
|
|
ranges from people who are looking for competitive intelligence about a business sector and don't
|
|
want their competitors to know that they are doing deep investigations of what's posted
|
|
on a public website to victims of domestic violence who are trying to use the web without
|
|
attracting attention from their attackers to people in government, so the tour was initially
|
|
funded by naval research, and government doesn't want people knowing what it's investigating,
|
|
even among public documents either.
|
|
And so, at a whole range of uses, among the uses that we're seeing lately, an increasing
|
|
number of people using it to circumvent national level censorship, filtering the great
|
|
firewall of China, because traffic through the tour network is encrypted and only comes
|
|
out at the other end from a different country often than where it started.
|
|
You won't trigger a key word or a destination based filtering rules, and so a user in China
|
|
trying to learn more about the events of Tiananmen Square might be able to get to sites through
|
|
a tour that were blocked through an unfiltered connection, or heart rate filtered connection.
|
|
So I'm gathering what happens that I'm at home, I fire up tour, I go out onto the
|
|
interweb, and my signal instead of going to Google.com goes to someone else's server or something,
|
|
and then it goes to Google or what, I mean how does it work and who's servers on my bouncing
|
|
off of?
|
|
Well, the servers in the tour network are run by volunteers, so each node and its volunteer
|
|
are operated, and we call it onion routing because at the source the packets are wrapped
|
|
in a few layers of encryption, and the tour design uses a three-hop route, so you find
|
|
an entry node, it unwraps one layer of encryption which tells it the destination for the next
|
|
talk, and that middle node then doesn't know the source or the destination only that it's
|
|
got a somewhat encrypted packet that it needs to, a fully encrypted packet that it needs
|
|
to fully, that it needs to pass on to an exit node, the exit node unwraps, sees the destination
|
|
but not who's sent it into the network, and sends it off to Google or the site you were
|
|
trying to reach, and then it takes the same path in reverse on the way back, and how is
|
|
this path determined, like I mean if I go to Google, am I always sent the same way to
|
|
it, or is it just like whatever's available, or?
|
|
I should know here that I'm not one of the technical architects, so I have no idea what I'm
|
|
asking anyway, but the design, it's all fully open-source and open spec specified on the
|
|
site, so I believe that the routes are determined and left for a period of a few minutes, and then
|
|
get cycles switched on, but if I'm wrong, everyone can go to the torproject.org website and read
|
|
the correct address, the description instead.
|
|
Okay, well here's the question that you probably do know that, and I think you already answered
|
|
it, but it might be a dumb question.
|
|
So if I'm at a conference, like Southeast Literacy Festival, I decide I want to check my
|
|
email, and normally I would tunnel, you know, I'd make an SSH tunnel and just fire up a
|
|
web session through there and do all my browsing through there, so if I had torr, could
|
|
I start that up and that would encrypt from end to end the same way, or is it different?
|
|
Well, in the similar way to your SSH tunnel, so like your SSH tunnel, tor can't encrypt the
|
|
connection between an exit and a website or other service that doesn't offer encrypted
|
|
connection, but you put the tor client onto your machine and then your traffic is encrypted
|
|
from there until the point that exits the tor network.
|
|
Okay.
|
|
So if you were concerned, somebody at one of these conferences was sniffing your connection,
|
|
trying to see what you were doing, routing the connection through torr would stop that.
|
|
Okay, so just, I guess just briefly like a brief explanation, so if I want to go home now,
|
|
because I've learned about Torr, I want to sit down from my computer and get it and start using it on a
|
|
Linux box, how do I set that up?
|
|
Well, depending on what distribution you use, go to torproject.org and you can get source code,
|
|
tarballs, or packages that are made up for many distributions and install those from
|
|
whatever package manager you use.
|
|
If you were using a Windows or Macintosh system, there are even bundles that you could download for
|
|
Windows, you could download the Torr browser bundle and put it onto a USB stick to take with you.
|
|
Right.
|
|
If you went to an internet cafe and didn't want to use whatever was installed locally on their machine,
|
|
you could launch this from USB key and you could set up like a proxy thing or something I
|
|
seem to recall.
|
|
I have to set that up on Firefox when I get it to recognize it or was enabled or something
|
|
like that, does that sound familiar?
|
|
So, if you are not using the bundle, which sets those things up for you, then you would have to
|
|
tell Firefox directly, I'm not connecting directly to the internet instead I'm using an HTTP
|
|
proxy and that HTTP proxy is sending the traffic to Torr, which behaves as a socks proxy.
|
|
Okay.
|
|
All right.
|
|
And so, for us, your Polyfo will serve as that middle layer.
|
|
Okay.
|
|
So, what?
|
|
I mean, if you can install the Torr button extension for Firefox, that's what I use.
|
|
Which will do the toggle for you and also protect you against various nasty JavaScript and
|
|
history sniffing attacks that could provide to correlate your browsing behavior between anonymous
|
|
and non-anonymized states.
|
|
So, I'm using Torr.
|
|
I go to Google, it's all in German.
|
|
Why is that?
|
|
What does that mean?
|
|
Well, it's because Google is using geolocation detection and it sees that your packets are exiting
|
|
to the Google server from probably an exit node located in Germany.
|
|
Right.
|
|
And so, Google thinks it's being helpful by giving you Google.de instead.
|
|
And you can know it's working.
|
|
That's right.
|
|
Even without going to the Torr check.
|
|
Right.
|
|
Well, website.
|
|
Right.
|
|
And so, there is a Torr check.
|
|
There is that where it will say that you are not.
|
|
You are.
|
|
Or at least you are exiting from a known Torricks that node.
|
|
Yeah.
|
|
And we mentioned public lists of those Torricks that node.
|
|
So, I mean, to set up, let's say that I had a spare, I guess, server or I guess a world-connected
|
|
server.
|
|
I mean, how could I set up, is it complex to be a tour node or is it kind of like just installing
|
|
a server daemon or something and going for it?
|
|
It is not complex, technically.
|
|
It's the same package that would give you a Torr client.
|
|
Change a few configuration options.
|
|
Okay.
|
|
Either in the text configuration file on the Linux machine or through the Vidalia GUI.
|
|
And you can off to become a server.
|
|
And you can set your exit policy.
|
|
Okay.
|
|
Which course you want to permit exit.
|
|
Okay.
|
|
And you're good.
|
|
Or if you choose, you can be a middle node in the Torr network that just passes it.
|
|
Just passes traffic.
|
|
Yeah.
|
|
In the middle of those connections.
|
|
Right.
|
|
So it doesn't get seen by the outside world as a source of traffic.
|
|
Or you can off to be a bridge relay helping users from censored countries.
|
|
Or to connect to the network.
|
|
If they have difficulty reaching the publicly listed node.
|
|
So I set up the Torr middle node at work without anyone knowing that I was doing it.
|
|
Because I was in a test environment anyway.
|
|
So I figured, why not?
|
|
Are there any signs that there is a middle node on like one of my servers?
|
|
Well, I'll assume that you had all the right authorization to do that.
|
|
Yeah, yeah, yeah.
|
|
And it was my server.
|
|
Sure.
|
|
And so you'll see increased traffic.
|
|
Right.
|
|
Yes.
|
|
Which is true in front of the machine.
|
|
Which is what I wanted.
|
|
That's what I wanted to generate anyway.
|
|
But that's it really.
|
|
I mean, it's not like you might see increased CPU usage.
|
|
I'm not aware of other things that you would see.
|
|
Okay.
|
|
And then you're helping to contribute to the network.
|
|
Helping to make it run faster for everyone else who uses this.
|
|
Yeah.
|
|
Contributing to the anonymity shaft would make the anonymity stronger for everyone using the network.
|
|
So I kind of forgot to ask you, what do you do for Torr?
|
|
Who are you?
|
|
Well, thanks for limiting.
|
|
I am a member of the Board of Directors.
|
|
Torr is a 501-C3 non-profit.
|
|
So it's a core team of now like seven page employees working on the development of the code and the architecture of the network.
|
|
And so as a non-profit, we have a board of directors working on the strategic goals of the organization and some fundraising.
|
|
So if you like Torr and you're not able to run a server, encourage people to go to Torr project.org.
|
|
And see if there's a donation they can make.
|
|
You can do one of the code, money, time, any of the translations, any of those things that are helpful to the project.
|
|
Yeah.
|
|
One of the first time I heard about Torr was at an organization called Human Rights Watch, which sends out people to basically watch country governments see how they're treating humans.
|
|
If they're human rights abuses, things like that.
|
|
And they, in order, like you said, I think, you know, in order to be protected from people trying to figure out that they were in the country watching, you know, they had to use Torr.
|
|
So I mean, it's project like that.
|
|
I mean, it's not just a paranoid hacker in his mom's basement wanting to use Torr to be paranoid.
|
|
It's like real people like meeting, you know, the, the, and the enmity that they deserve and that they, that they have a right to really.
|
|
But that's right.
|
|
And aid workers going into foreign companies or places with corrupt local administrators who wouldn't like, you know, or who would very much like to know.
|
|
Right.
|
|
Cause harm to somebody who was reporting on conditions there using Torr and other good security practices to disguise their location and hide their traffic.
|
|
That is absolutely an important use.
|
|
Yeah, really important.
|
|
Yeah.
|
|
I really, I admire all the work that you guys are doing at the onion router.
|
|
And I thank you for your time and the energy.
|
|
Thank you very much.
|
|
Okay.
|
|
Thank you for listening to Hack with Public Radio.
|
|
HPR is sponsored by Carol.net.
|
|
She'll head on over to CARO.NAC for all of her TV.
|
|
Oh.
|
|
Oh.
|