10 years of collecting Tor directory data
Today is the 10th anniversary of collecting Tor directory data!
As the 2004 Tor design paper says, "As of mid-May 2004, the Tor network consists of 32 nodes (24 in the US, 8 in Europe), and more are joining each week as the code matures."
In fact, we still have the original relay lists from back then. The first archived Tor directory dates back to May 15, 2004. It starts with the following lines which are almost human-readable:
signed-directory
published 2004-05-15 07:30:57
recommended-software 0.0.6.1,0.0.7pre1-cvs
running-routers moria1 moria2 tor26 incognito jap dizum
cassandra metacolo poblano ned TheoryOrg Tonga
peertech hopey tequila triphop moria4 anize rot52
randomtrash
As of today, May 15, 2014, there are about 4,600 relays in the Tor network and another 3,300 bridges. In these 10 years, we have collected a total of 212 GiB of bz2-compressed tarballs containing Tor directory data. That's more than 600 GiB of uncompressed data. And of course, the full archive is publicly available for download.
Here's a small selection of what people do with this fine archive:
- The metrics portal shows graphs of network growth over time and estimates of users derived from directory activity.
- The ExoneraTor service allows people to look up whether a given IP address was part of the Tor network in the past.
- The websites Atlas, Globe, and Compass let users explore how specific relays or bridges contribute to the Tor network.
- The Shadow Simulator uses archived Tor directory data to generate network topologies that match the real Tor network as close as possible.
- The Tor Path Simulator uses Tor directory archive data to simulate the effect of changes to Tor's path selection algorithm.
If people want to use the Tor directory archive for their research or for building new applications, or want to help out with the projects listed above, don't hesitate to contact us!
Happy 10th birthday, Tor directory archive!
Comments
Please note that the comment area below has been archived.
Happy 10th birthday
Happy 10th birthday
Yes, it does indeed call for
Yes, it does indeed call for a joyous celebration....but...wait...
Of the Tor directory data, how many bridges, nodes and relays are run by the NSA, FBI, CIA, GCHQ (UK) and the other 3 "eyes"? Or is such information top secret?
Ah, that one is easy:
Ah, that one is easy: https://globe.torproject.org/#/search/query=nsa (17 relays, 5 bridges), https://globe.torproject.org/#/search/query=fbi (1 bridge), no results for the others.
Ha. I like Karsten's answer.
Ha. I like Karsten's answer. But if you want a second answer, I encourage you to 1) look through all the threads at https://ocewjwkdco.tudasnich.de/blog/tor-nsa-gchq-and-quick-ant-speculation, and 2) watch our 30c3 talk from December: https://events.ccc.de/congress/2013/Fahrplan/events/5423.html
17 relays and 5 bridges
17 relays and 5 bridges hosted by the NSA? When was that? What about this year?
Has Tor developers done anything to prevent NSA, FBI, CIA and GCHQ from running rogue relays and bridges?
Karsten's response was a
Karsten's response was a joke (but a funny one). He responded to the "which relays are run by nsa" by showing you which relays have the substring "nsa" in their nickname. It is funny on the surface because of course anybody could put, or not put, that substring in their nickname. And funny underneath because it underlines how hard it is to actually answer a question like that for sure.
But to give more concrete answers, as far as we know there have never been any relays or bridges run by the NSA. But that shouldn't make you happy, because the attack I worry about is having their surveillance cover somebody else's perfectly honest relay. Why should they run their own relays when they can watch yours, and get almost all of the benefits with fewer risks? But here I am repeating all of my statements from the gchq-quick-ant blog post, so I'm going to stop doing that here and invite you again to go read all of them there.
(Oh, and there *were* some relays run on amazon ec2 by gchq. Most of them were tiny and only for a week. Go check out the remation 2 documents.)
SO there you go I mean these
SO there you go
I mean these guys are getting paid so you do not something for nothing these days
tim
Huh? I'm afraid you'll have
Huh? I'm afraid you'll have to be a little bit less subtle in what you're saying.
As I understand it, the US,
As I understand it, the US, Canada, Europe, Australia and NZ are trying their best to change and upgrade their economies from manufacturing to IT-based.
Let's face it: most manufacturing jobs are outsourced to China, Vietnam, Bangladesh, Brazil, etc.... which provide jobs to millions of people.
Those manufacturing jobs that are still in the US, Europe, Australia, etc.. are few and far in between. Take for example, how many jobs can manufacturers of aircraft, military drones, satellites, etc...offer to job seekers?
The US has since realized that the only way to create more jobs for its citizens is to heighten the sense of insecurity among the world's population leading to the need for more online surveillance.
The US plans to recruit more than 6,000 people next year. The excuse is cyber security.
Could you put a graph on Tor
Could you put a graph on Tor Metrics Portal for number of Pluggable Transport users out of all bridge users and the number of users for each indivdual PT ( obfs3, fte and flash proxy )?
There are graphs on the
There are graphs on the number of bridge users by pluggable transport on the metrics website: https://metrics.torproject.org/users.html#userstats-bridge-transport. (And there's an open ticket to add another graph for all pluggable transport users combined, so that should be available at some point.) In the meantime, if you want to play with the numbers yourself, here's the CSV file: https://metrics.torproject.org/stats.html#clients
But don't trust those numbers too much, because they may not be as accurate as you'd hope. See this FAQ at the bottom of the page: "Q: Why are there so few bridge users that are not using the default OR protocol or that are using IPv6? A: Very few bridges report data on transports or IP versions yet, and by default we consider requests to use the default OR protocol and IPv4. Once more bridges report these data, the numbers will become more accurate."
Wasn't there a FF security
Wasn't there a FF security update yesterday? is there gonna be a new TBB release/update soon?
Just a thought: With almost
Just a thought: With almost complete data collection, “forever” storage, and quantum exploitation on the horizon, I think it would be only prudent to continually upgrade Tor encryption to the strongest available. And maybe audit its implementations.
me very try tor at iran
me very try tor at iran sorry no work for me
You should add
You should add https://tor.stackexchange.com/ and https://tails.boum.org to the default bookmarks in TorBrowser