Transparency, Openness, and Our 2020 Financials
Every year, as required by U.S. federal law for 501(c)(3) nonprofits, the Tor Project completes a Form 990, and as required by contractual obligations and state regulations, an independent audit of our financial statements. After completing standard audits for 2019-2020,* our federal tax filings and audit are both now available. We upload all of our tax documents and publish a blog post about these documents in order to be transparent.
Transparency for a privacy project is not a contradiction: privacy is about choice, and we choose to be transparent in order to build trust and a stronger community. In this post, we aim to be very clear about where the Tor Project’s money comes from and what we do with it. This is how we operate in all aspects of our work: we show you all of our projects, in source code, and in periodic project and team reports, and in collaborations with researchers who help assess and improve Tor. Transparency also means being clear about our values, promises, and priorities as laid out in our social contract.
This year’s version of the financial transparency post is a bit different than past iterations: we hope that by expanding each subsection of this post and adding more detail, you will have an even better understanding of the Tor Project’s funding, and that you will be able to read the audit and Form 990 documents on your own should you have more questions.
*Reminder: We no longer tie our tax filings and our audits to the calendar year; instead our fiscal years run from July through June. We made this change in 2017 because following the calendar year meant that our fiscal years were ending right in the middle of fundraising season (December), making it harder to plan budgets.
Fiscal Year 2019-2020 Summary
The last few years have been bumpy financially for the Tor Project, but at the end of 2019 and beginning of 2020, we began stabilizing. You helped make this possible by contributing to an incredibly successful 2019 year-end campaign, raising more funds than we ever had before during a year-end campaign up to that point. We were looking towards rebuilding our reserves after having to use them to cover expenses in 2017 and 2018.
Then, of course, the COVID-19 pandemic changed the world. Individual donations took a drastic downturn, events (where we raise donations at booths) were canceled for the rest of the year, and foundations shifted their funding strategies to stabilize their current grantees. Some foundations even completely halted their giving for the year.
Despite all of these challenges, we ended the financial year (June 2020) in a stable place.
Revenue & Support
Tor’s total revenue and support in fiscal year 2019-2020 was a bit under $4.9 million. Take a look at page two of the audit:
You can see that “Revenue and Support” is broken into five different categories in the audit documents: most categories are more or less self-explanatory, but let’s talk about in-kind contributions. In-kind contributions are donated services or goods--like translation completed by volunteers, website hosting, donated hardware, and contributed patches. This year, we counted $450,705 in donated services: that’s 2,490 hours of software development, 1,203,719 words translated, and roughly $96K in cloud hosting services. Clearly, Tor would not be possible without you. Thank you!
Because in-kind contributions don’t equal actual money in the bank--but instead equate to value assigned to donated services and goods--think of the $450,705 in-kind contributions as the “Support” portion of the Revenue and Support category. Consider the remaining $4,400,782 in this category as the “Revenue.”
In the 2019-2020 fiscal year, our “Revenue and Support” was less than the previous fiscal year by about $700,000. On the surface this might seem scary, but this reduction in revenue and support also comes with a reduction in expenses and a reversal of unsustainable spending of our reserves. Here’s a comparison, where you can see that in FY 2018-2019, we had to spend a significant amount of our reserves. In FY 2019-2020, we actually increased our assets slightly, despite all of the challenges related to COVID-19.
|
|
|
|
|
|
|
|
|
|
|
|
Government Support
We get a lot of questions (and see a lot of FUD) about how the U.S. government funds the Tor Project, so we want to make this as clear as possible, and show you where to find this information in the future (or for previous years) in these publicly-available documents.
Let’s talk specifically about which parts of the U.S. government support Tor, and what kind of projects they fund. Below, you can see a screenshot from the Tor Project’s FY 2019-2020 Form 990 on page 42, where we’ve listed all of our U.S. government funders. You will find text like this in all of our Form 990s.
Now, we’ll break down which projects are funded by each entity and link you to places in GitLab where we organize the work associated with this funding.
U.S. State Department Bureau of Democracy, Human Rights, and Labor ($752,154)
- Project: Empowering Communities in the Global South to Bypass Censorship.
- Description: This ongoing project’s goal is to empower human rights defenders in the Global South by improving censorship event detection and reporting, ensuring users have the best options for their needs to bypass censorship, and informing human rights defenders when censorship is happening and how to bypass it.
National Science Foundation + Georgetown University ($98,727)
- Project: Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework
- Description: This ongoing project’s goal is to develop a scalable and mature deterministic network simulator, capable of quickly and accurately simulating large networks such as Tor. This project builds on the Shadow Simulator.
Open Technology Fund ($908,744)
- Project: Observing and Responding to Internet Censorship Around the World
- Description: This completed project aimed to provide timely evidence of internet censorship events. Funding passed through the Tor Project to the Open Observatory of Network Interference (OONI) when they were still a team inside of the Tor Project, and not their own nonprofit organization as they are today.
- Project: Onion Services (links to final project report, PDF)
- Description: This completed project brought v3 onion services in parity with v2, brought v3 support to Onion Balance, human readability of onion services addresses, and mechanisms (e.g., Onion Cannon) to better investigate DDoS attacks.
- Project: Tor Browser Security, Performance, & Usability Improvements.
Institute of Museum and Library Science + New York University ($101,549)
- Project: This funding passed through the Tor Project to Library Freedom Project to deliver the Library Freedom Institute.
Defense Advanced Research Projects Agency + Georgetown University
- Project: Reliable Anonymous Communication Evading Censors and Repressors (RACECAR)
- Description: This ongoing project’s goal is to understand how to obfuscate communication in the presence of an adversary that controls the entire network, by hiding all communications inside traffic generated by common applications.
For even more about how government funding works for the Tor Project, consider reading our previous financial transparency posts, as well as Roger’s thorough comments on these posts.
Other Grants & Contracts
Of the remaining 47% of our revenue, about 26% comes from non-U.S. governments, foundations, other nonprofits, and corporations.
Many of these contributions are in the form of restricted grants, which means we propose a project that is on our roadmap to a funder, they agree that this project is important, and we are funded to complete these projects. Some examples in this category include DIAL Open Source Center’s support of Tor Browser ESR migration work, Zcash Foundation’s support of our project to write the specs for Walking Onions, and RIPE NCC’s support of our work to improve IPv6 support on the Tor network.
Also in this category are unrestricted funds, like support from Media Democracy Fund, Craig Newmark Fund, and FOSS Responders. These unrestricted funds are not tied to a specific project, which means we can use this funding to respond and develop our tools in a more agile way.
Unrestricted funds also include contributions from corporations, and is where you will find membership dues from our members. In the 2019-2020 fiscal year, you’ll see contributions from our first two members, Avast and Mullvad! We haven’t listed every single entity you will see in our Form 990 in this blog post, but we hope you have a better understanding of what you might find in the Form 990. Please explore these documents to learn even more!
Individual Contributions
Individual contributions come in many forms: some people donate $5 to the Tor Project one time, some donate $100 every month, and some make large gifts annually. The common thread is that individual donations are unrestricted funds, and are the most important kind of support we receive. Unrestricted funds allow us to respond to censorship events, develop our tools in a more agile way, and ensure we have reserves to keep Tor strong in case of emergencies (like what happened in 2020, with COVID-19.)
In the 2019-2020 fiscal year, you contributed $890,353 to the Tor Project in the form of one-time gifts and monthly donations. These gifts came in all different forms (including ten different cryptocurrencies, which are then converted to USD), and come together to equal our greatest individual fundraising year in our history. Thank you!
Expenses
OK, we’ve told you how we get funding (and which documents to look at to learn more). Now what do we do with that money? You can find that information on page four of this year’s audit.
We break our expenses into three main categories:
- Administration: costs associated with organizational administration, like salary for our Executive Director, office supplies, business insurance costs;
- Fundraising: costs associated with the fundraising program, like salary for fundraising staff, tools we use for fundraising, bank fees, postal mail supplies, swag; and
- Program services: costs associated with making Tor and supporting the people who use it, including application, network, UX, metrics, and community staff salaries; contractor salaries; and IT costs.
In the 2019-2020 fiscal year, 90.4% of our expenses were associated with program services. That means that a very significant portion of our budget goes directly into building Tor and making it better. Next comes fundraising at 6.4% and administration at 3.2%.
According to Charity Navigator, technology nonprofits for which program services make up more than 82.5% of their expenses receive the highest “financial health” score in their ranking system. This means that we’re meeting and significantly exceeding the “industry best” for tech nonprofits. We’re proud to show that our work is both efficient and effective.
Ultimately, like Roger has written in many past versions of this blog post, it’s very important to remember the big picture: Tor's budget is modest considering our small staff and global impact. And it’s also critical to remember that our annual revenue is utterly dwarfed by what our adversaries spend to make the world a more dangerous and less free place.
In closing, we are extremely grateful for all of our donors and supporters. You make this work possible, and we hope this expanded version of our financial transparency post sheds more light on how the Tor Project raises money and how we spend it. Remember, that beyond making a donation, there are other ways to get involved, including volunteering and running a Tor relay!
Comments
Please note that the comment area below has been archived.
Thanks Al for doing the…
Thanks Al for doing the financials blog post this time around. I love the level of detail and transparency!
I've tried reading financial…
I've tried reading financial statements from the Tor Project before just for the lols. But because of how hard to read they are the lols quickly diminish, so this blog post is appreciated.
I like the section that goes into detail about US government funding, partly for my own curiosity but mainly because it's a good place to point people to when they ask the question about the US government's involvement with Tor that you've been getting asked for 15 years.
> I like the section that…
> I like the section that goes into detail about US government funding, partly for my own curiosity but mainly because it's a good place to point people to when they ask the question about the US government's involvement with Tor that you've been getting asked for 15 years.
I agree and it is unfortunate that it is so hard to keep track of these links. Ideally they would be easy to find (and kept unbroken) on a TP page. Maybe a FAQ?
In past years, one of the most inflammatory issues which was mostly censored from this blog--- apparently due to legal reasons deriving from a then inadequate TP hiring process--- was the revelation that TP (well, Roger) had hired a coder whose resume stated that he had worked in the Near East for the US State Department, when in fact this was his cover for CIA employment. Some but not all TP employees were outraged when this was discovered by one of them, TP tried to fire the new hire on the grounds of lying on his resume, and the liar's lawyer apparently made life hell for TP. (Yes, the "one" was Jake Appelbaum, who was later himself fired for sexual misconduct, which must have delighted the many many enemies of Tor.)
In past submitted comments which never appeared in this blog :-( I also expressed concern about the apparent workplace of a particular Team Cymru employee, for several months a few years ago, in the FANX Annex of NSA (since renamed).
To balance that: it has not escaped my attention that Team Cymru played a positive role in the investigation by the wonderful people at Citizen Lab of Candiru, which is one of the largest cyberwar-as-a-service companies (other than cybewar divisions of general defense firms such as Verint, Boeing, etc):
https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware…
It would be great if Team Cymru were more open about exactly what its activities are and who its customers are. It is believed that customers include US Secret Service and the Drump-damaged anti-tax-evasion arms of Dpt. of Treasury, which is not neccessarily bad, but it is important to know exactly what Team Cymru does for these agencies (if it is true that they are clients).
We must be very suspicious of Microsoft's central role in cyberwar activities by various governments (not always friendly to the USA), but I also acknowledge that Microsoft appears to have done the right thing here, by independently verifying and augmenting the findings of Citizen Lab and by blocking Candiru from partnering with Microsoft:
https://www.microsoft.com/security/blog/2021/07/15/protecting-customers…
> Microsoft and Citizen Lab have worked together to disable the malware being used by SOURGUM that targeted more than 100 victims around the world including politicians, human rights activists, journalists, academics, embassy workers, and political dissidents.... Agencies in Uzbekistan, United Arab Emirates, and Saudi Arabia are among the list of Candiru’s alleged previous customers. These agencies, then, likely choose whom to target and run the cyberoperations themselves.
In the context of panic in USG circles over the recent cyberattacks which took down some major players in US food production and distribution, it seems noteworthy that one of the targets of Can diru malware was a Czech grocery chain. Perhaps a rival company hired Candiru to kill off a competitor? I can certainly see US telecoms doing that, but attacking food distribution seems to be a novel horror.
@ Anne Neuberger and Chris Ingalls: any comment?
Re-hire the staff that you…
Re-hire the staff that you let go because of COVID-19.
Thankfully, we have been…
Thankfully, we have been able to re-hire many of these positions, and bring folks back up to full-time who we had to move to part-time.
Good to know! Many thanks…
Good to know! Many thanks to everyone who works so hard to keep Tor Project alive and adapting to an ever more political/legal/technical threat landscape!
Please post the news from a…
Please post the news from a staff member of DUCKDUCKGO that v3 is now available and should be switched to especially within Tor Browser:
While the following is given:
https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/
For some reason I couldn't get it to work until I added "html" at the end:
https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/…
From the news post here:
https://old.reddit.com/r/duckduckgo/comments/oc07wj/news_duckduckgo_sea…
posted by DDG staff member https://old.reddit.com/user/tagawa
Please approve this message, it's important!
There's a ticket open for…
There's a ticket open for this issue, you can track the updates here: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/405…
Cool! But one small…
Cool! But one small objection:
> Tor's budget is modest considering our small staff and global impact.
The sentence itself is fine.
But when you talk about Tor's global impact and compare it with the spent money then actually you need to add to the calculation all the money relay operators spend because they are the ones that back a lot of this global impact.
(Let's forget about users in this calculation because their global impact is even more uncertain and impossible to guess into money).
So we have about 8000 relays and bridges.
The average relay probably costs between 5 - 15 € a month.
That's about 40.000 - 120.000 € a month for the whole network so about 500.000 - 1.5 million € a year.
So about 10 - 30 % of the torprojects budget is what relay operators all over the world are spending for providing the services you guys are producing.
That's right, the network…
That's right, the network would not be possible without the investment (time, energy, money) that relay operators put in every day.
I wish I could afford to…
I wish I could afford to rent a server and run my own relay, but I can't. However I am more grateful than I can say to those of you who do run a relay!
I agree that TP should try harder to harp on the theme that the Tor network and Tor software rely very heavily on a global network of volunteeers who believe passionately in all the good that is enabled by Tor.
Good point, and very nice…
Good point, and very nice analysis! Thanks!
I find it interesting that…
I find it interesting that the bulk of government-related grants are from the Open Technology Fund and the Bureau of Democracy, Human Rights and Labor. Critics of Tor usually claim government direction is coming from attack organizations like military, police, surveillance and spy agencies, crypto backdoor advocates, etc. But these financials show a nearly 3 to 1 ratio of government funding from soft-power diplomatic, anti-censorship, and apparently constructive organizations.
The financials list government organizations only in the United States. Are governments besides the United States funding Tor Project?? It is a worldwide project after all. The amount of relays in Germany rivals the amount in the United States, and the amounts of relay users and bridge users whose autonomous system (AS) appears to be in Russia, Germany, and Iran rival the amount in the United States.
> I find it interesting that…
> I find it interesting that the bulk of government-related grants are from the Open Technology Fund and the Bureau of Democracy, Human Rights and Labor. Critics of Tor usually claim government direction is coming from attack organizations like military, police, surveillance and spy agencies, crypto backdoor advocates, etc.
To save TP employees the trouble: yes, this kind of backdoor was possible in Anom only because that was not an open-source product. But this does not by itself do much to mitigate user concern that NSA is seeking to influence development of Tor in ways which benefit agency needs and requirements.
I agree with what you actually wrote, but I wish you had added that discussion in this blog of possible backdoors is hardly FUD. We might recall some specific revelations from the Snowden leaks:
1. NSA tried hard to covert plant a hard-to-spot weakness in a crucial NIST protocol (but failed)
2. In 2012 NSA was trying hard to break Tails but not having much luck; we later learned that at the time Tails (and pretty much every other computing resource available to citizens) was vulnerable to shellshock, SPECTRE, meltdown, rowhammer, and other horrifying hard to fix vulnerabiltiies which were discovered by non-USG researchers and which were apparently never known to NSA, at least not before 2013,
3. NSA asked GCHQ to target Glenn Greenwald and people suspected of enabling Wikileaks activity, or contributing leaks to Wikileaks.
Further, from previous revelations we know
1. NSA managed to persuade a key employee of Crypto AG (the Swiss company which provided cipher machines to many countries in Latin America, Africa, and Eastern Europe during the Cold War) to put a weakness into the algorithms which enabled NSA to freely break into diplomatic and military communications "protected" by Crypto AG machines,
2. NSA directed submarine and surface cable-tapping and microwave phone link tapping operations, leading in one case to tragedy when IL warplanes sank a spy trawler which got too close, literally, to the IDF massacre of civilians in a refugee camp, on direct orders from Gen. Ariel Sharon, during the IL invasion of Lebanon (the commander of the ship wanted to move away but was overruled, apparently on the insistence of NSA),
3. A top NSA official deliberately mislead President Johnson during the Tonkin Gulf crisis, very likely ensuring the long-tailed disaster Americans call the Vietnam War.
And now comes this example of a genuine backdoor in a commercial product sold as a "privacy protection technology":
https://www.wired.com/story/fbi-anom-phone-network-encryption-debate/
> according to court documents, the agency had taken down another secure communications system marketed to criminals, then convinced one of its developers to become an informant. At the FBI's request, that unidentified person snuck an addition into Anom: a calculator app that relayed every communication sent on the platform back to the FBI.
Unfortunately, official TP response to well-founded concerns about possible USG breakage of Tor is to state (truthfully) that published code of Tor client and server software can be read by outside experts looking for suspicious code or cryptographic weaknesses, while ignoring the often expressed concern that NSA attackers are far more likely to find and exploit "upstream" weaknesses in things like pseudorandom number generators, clipboards, or (shudder) hardware, etc.
I wish TP was not so shy about publishing in this blog, for example, a call for NIST to repeat its highly successful open-source contest which lead to the adoption of Rjindael cipher as the AES standard, by funding three seperate open academic-researcher directed contests calling for submissions of next-generation ciphers exploiting elliptic curves, quantum cryptography, and homomorphic encryption. Obviously, reliable next-generation encryption will be necessary to ensure the safety of Tor users going forward, as will keeping the dirty paws of USG cyberspies from coming anywhere near NIST standards.
Sorry. I asked if…
Sorry. I asked if governments besides the US are funding TP. Further down, the report says, "Of the remaining 47% of our revenue, about 26% comes from non-U.S. governments, foundations, other nonprofits, and corporations." Thank you! I wish the funding was more even between countries, though, to balance potential influence.
Yes, we get some funding…
Yes, we get some funding from the Swedish International Development Agency (https://www.sida.se/en/) to do user research and user experience improvements.
Let's hope that "research"…
Let's hope that "research" isn't similar to the "research" done by MIT huh?
Not that you would care, swanky new York office for Mr big boots
Plus one
Plus one
So happy to see that…
So happy to see that TorProject transparency re financials continues to improve! This is the best yearly report ever, I think.
It is encouraging that user contributions are non-negligible but I hope TP will continue to make it a strategic priority to increase that share until most TP funding comes from user contributions.
You mention Charity Navigator, which I also think is a fine service. Some years ago I suggested in a comment to this blog that TP work towards obtaining a top level Charity Navigator ranking, similar to that enjoyed by ACLU (not to be confused with ACLU Foundation which is rated separately). I hope TP will continue to work toward that goal (part of which I think involves persuading Charity Navigator that Tor Project is review-worthy).
Some other posters mention FUD in blog comments years ago. I have been a Tor user and a follower of this blog from almost their beginnings and just want to say that best comments raising concerns about the much-hated "letter sponsors" were certainly not FUD. Some posters even acknowledged (in response to Roger D) that we appreciated that Cold War era regulations appeared to make it very difficult to accept funding from USG "soft-power" sources without that awful letter designations. I mention this because I see that TP is now able to be much more specific about the USG agencies which give grants to Tor Project. What changed?
Few users will be inclined to howl when they see agencies like NSF or OTF giving much needed money to Tor for specific projects--- the Global South stuff is particularly needed right this minute!--- but in my opinion DARPA funding continues to be a problem. I am aware that individual researchers who accept DARPA funding may feel that they are as committed to privacy as anyone... but... there is really no way around the fact that DARPA exists to enable US military invasions and signature drone strikes and such, not to help journalists, environmentalists, political dissidents, indigenous peoples or human rights defenders. Tor Project really should keep entities like DARPA as far as possible from playing any role here.
On a happier note, it seems notable that there have been some very welcome developments regarding USG "soft-power". The previous administration tore the heart out of the very entities which were contributing to TP (and doing other generally beneficial things), but the new administration does appear to be reversing this. But OTF continues to be targeted in far right websites, and I fear that USG "soft-power" remains a very fragile thing. It follows that TP should make it another priority to find more sustainable sources which are not as susceptible to vicious political interference.
Transparency regarding corporate sponsors is almost as important as divulging USG funding. It seems that TP is not yet able to name all these sponsors? Ideally the corporations would themselves post blogs at their own sites saying "We support Tor Project because...". I am particularly curious to see how Avast would complete that sentence.
Last but not least, the fact that FBI backdoored the so-called Anom-phone (a commercial product which AFAIK never had any connections to Tor Project) is not FUD. (See the excellent coverage in several stories by Joseph Cox in Motherboard at vice.com.) It seems to me that this story deserves comment from Tor Project, not least because--- as privacy advocates were quick to point out when the story first broke--- this apparently successful FBI "sting operation" rather demolished several decades of official misstatements (well, lies) from generations of FBI Directors that FBI is "going dark" [sic]!
I wrote a thoughtful reply…
I wrote a thoughtful reply but it has not appeared so I am trying again.
Regarding OTF and Tor:
From a previous post which appeared in this blog during the last few months of the Drump administration:
> as part of its last-minute assault on "Deep State", the Drump admin has eviscerated the leadership of such US State Dpt tied "soft power" entities as OTF (Open Technology Fund), RFA (Radio Free Asia), from which Tor Project in the past obtained large grants. IMO, TP needs to clarify how this affects USG grants to TP in the years ahead.
For those who do not know, the Biden administration was (good!) quick to fire the Drump appointees and appears to have signalled strong support for news content at RFA etc free of political interferrence from the White House (or DOJ or Pentagon...). This is very good news, but going forward I think it should be clear to TP leadership that despite Biden's apparent good intentions toward USG "softpower" anti-censorship and truth-telling-as-good-policy, these entities remain highly vulnerable to political interferrence by future administrations. I hope TP will work to seek "no strings" grants from entities which are less vulnerable to the rapidly shifting winds of political power in the USA.
See also a recent opinion piece in salon.com which lauds Biden's moves to undo the worst damage done by the Drump admin to USG, including reinstating OTF. Techdirt points out that Biden has asked FCC to undo other Drump damage, but apparently forgot that he has not yet fully replaced the Drump appointees so that FCC cannot actually do what he is asking them to do. Other recent editorials point out that Biden has been using the very "unitary executive" theory established by the most conservative SCOTUS justices to fire Drump appointees, and that the next administration is likely to fire all of Biden's appointees. Further, Biden's appointees to lead the new USG cybersec regime are former NSA officials (Chris Ingalls, Anne Neuberger ) thus come from a spook culture which wants to keep cybersecurity weak in order to make it easier for NSA to spy on everyone living or dead. Many many news stories show how things which everyone ought to agree upon, such as cybersecurity and freedom of information, have become terribly politicized in ways never before seen in the USA, even during the worst days of the Nixon admin. These considerations imply, I think, that TP needs to think seriously about moving to Switzerland or Iceland and to avoid seeking USG monies in future.
My previous attempt to post…
My previous attempt to post a comment did not succeed so I am trying again.
I think the most important two numbers are individual contribs (c. 0.9 million USD) and total revenue (c. 4.9 million USD), so that EFF is currently about 18% user supported. That is good news and I hope TP will continue to make it a priority to try to increase that percentage to at least say 75%.
I see from other comments above that I am not the only user who is so sooo sooooo happy to see the demise of the "letter sponsors" of yore. It is really good to see that TP is able to be more specific now about precisely which US State Dept tied entity has given TP a generous grant. In past years, as I understood from Roger's comments, contractual obligations deriving from weird Cold War era requirements designed to signal that USG was trying to hide its connection to RFE ;-/ no doubt in deference to strenuous Stasi objects ;-/ forced TP to refer to "Sponsor F" and so forth. In coming years, I hope TP will be able to post here the actual contract with any USG agencies. I think this would do much to blunt a certain degree of (by not means entirely unjustified IMO) paranoia concerning possible hidden agendas of USG softpower, particularly from citizens of the former East Germany, such as outgoing Chancellor Merkel, who have good reasons to fear intelligence agencies--- not just the German but also American (and Russian and...)
> According to Charity…
> According to Charity Navigator, technology nonprofits for which program services make up more than 82.5% of their expenses receive the highest “financial health” score in their ranking system. This means that we’re meeting and significantly exceeding the “industry best” for tech nonprofits. We’re proud to show that our work is both efficient and effective.
Charity Navigator is really useful. In years past ACLU (not to be confused with ACLU Foundation) has consistently been rated highly, but EFF fell a little short on the transparency front. In past comments in this blog, I have urged TP to seek a dedicated review from Charity Navigator, which I believe involves convincing them that sufficiently many people use Tor that TP is review-worthy, which could be a problem since Tor users try to be hard to enumerate ;-/ I hope TP will try to work with Charity Navigator to resolve any problems they have giving TP an "official" rating. I think you are right that if they did that, TP would receive a high score. That might help a lot in recruiting more small user contribs, and might even help attract large "no strings" donations.
If someone like Soros offered money but wanted to remain anonymous, I would urge TP to argue for transparency. Yes, I am well aware of the amazingly hateful and counterfactual conspiracy theories targeting Soros which come from so many far right websites, so that a contribution from Soros would lead to firestorm of hate speech (or worse) from the most deplorable elements of the US far-right, but those people hate everything we stand for anyway, so...
> Project: Expanding…
> Project: Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework
> Description: This ongoing project’s goal is to develop a scalable and mature deterministic network simulator, capable of quickly and accurately simulating large networks such as Tor. This project builds on the Shadow Simulator.
This is really important for the future of Tor (which needs to be scaled way waaay up), and obviously could be very useful for other NGOs and researchers if it turns out to work really well.
It is good that you provided the link. I am the user who has over the years objected most strenuously to US military funding for Tor, but I also acknowledged (sometimes in comments which were not accepted) that I am not trying to demonize people simply because they have ties to the US military, e.g.
https://www.robgjansen.com/National Science Foundation + Georgetown University ($98,727)
For those who don't know, Georgetown U is also called "Foggy Bottom U" because of its US State Department ties. This kind of tie is not neccessarily a bad thing, but context is always valuable.
Again, if it were possible to get permission to post the actual contract I think that would do much to quash objections. In general, I think it best to admit up front that ultimately USG is likely funding ACE because sometimes "open" academic research comes up with something which is much better than what USIC single-source no-bid above-top-secret contractor has designed. Linux kernel, Rjindael (AES), and many other open source things are probably examples of that. There is no denying the fact that an open source network simulator which works really well at simulating large portions of the Internet would help the bad guys (all the worlds state-sponsored cyberattackers), but I think the proper response to that is "yes, but it helps the good guys just as much, so we can't deny it to the world just because it help's the bad guys".
Caveat: in reference to breaking AES, I would make the opposite argument, until the entire internet moves to a new well-tested cipher suite.
Erm... I see I have assumed that ACE is fully open source. It is, isn't it?
My previous attempt to post…
My previous attempt to post a comment did not succeed so I am trying again.
I think the most important two numbers are individual contribs (c. 0.9 million USD) and total revenue (c. 4.9 million USD), so that EFF is currently about 18% user supported. That is good news and I hope TP will continue to make it a priority to try to increase that percentage to at least say 75%.
I see from other comments above that I am not the only user who is so sooo sooooo happy to see the demise of the "letter sponsors" of yore. It is really good to see that TP is able to be more specific now about precisely which US State Dept tied entity has given TP a generous grant. In past years, as I understood from Roger's comments, contractual obligations deriving from weird Cold War era requirements designed to signal that USG was trying to hide its connection to RFE ;-/ no doubt in deference to strenuous Stasi objections ;-/ forced TP to refer to "Sponsor F" and so forth. In coming years, I hope TP will be able to post here the actual contract with any USG agencies. I think this would do much to blunt a certain degree of (by not means entirely unjustified IMO) paranoia concerning possible hidden agendas of USG softpower, particularly from citizens of the former East Germany, such as outgoing Chancellor Merkel, who have good reasons to fear intelligence agencies--- not just the German but also American (and Russian and...)
I just might be the only commentator here who has actually read the 2020 book by Yasha Levine, Surveillance Valley
https://donkasprzak.com/surveillance-valley/
and IMO all Tor users should read this book. It is far more balanced IMO than some might expect from the Pando furore which occurred in this blog years ago (some of the critical comments came from me, unfortunately -before- I had the chance to read Levine's book). I would just add that if we omit to rant against Rob Jansen (say) simply because he teaches at a U.S. Military Academy, we should also omit to rant against Yasha Levine just because he is very suspicious of the NRL early involvement in Tor development. It seems noteworthy that my willingness to give some people with US military or Russian ties the benefit of the doubt may derive from personal knowledge of some NRL and USNA employees, as well as some people who travel freely between the USA and countries whose governments are well known to spy very intensively on USG (and US based human rights groups).
> Project: Reliable…
> Project: Reliable Anonymous Communication Evading Censors and Repressors (RACECAR)
>
> Description: This ongoing project’s goal is to understand how to obfuscate communication in the presence of an adversary that controls the entire network, by hiding all communications inside traffic generated by common applications.
It would be very helpful to post the actual contract and IMO you should urge DARPA to sign off on doing that.
[Moderators: please do not censor the following]
"Transparency" is a problematic term, because it has two very different meanings in the context of Tor: 1. disclosure of true sources of funding, project goals, technical details. 2. penetration of cybersecurity and privacy protections in order to eavesdrop on conversations, modify data, control or influence information, speech, opinions, financial transactions and associations.
DARPA is far and away the most worrisome source of TP funding. RACECAR is on the face of it valuable, and it is plausible that portions of USG want to get open source academic research input on how to evade CN censorship in particular, in order to pursue soft power truth telling (good) and disinfo (yuk) targeting CN citizens. The problem is of course that DARPA will share any behind the scenes information learned with USIC people who want to make sure they can spy freely on particular Tor users--- the problem here is that US intelligence operatives choose whom to attack and why, and there is good reason to think their targets are mostly very different from the "typical target" they prefer to the media to focus on: genuine international criminal cartels, child pronsters, human traffickers, or foreign government cyberwarriors. USIC doesn't want anyone to talk about what everyone here knows: USIC targets many journalists, bloggers, readers, political dissidents, cybersecurity researchers, human rights groups, telecom engineers and scientists (just because of their profession), travelers (because of their destination not to any ill-intent towards USG) etc. (We can also expect USIC to begin to be more aggressive in targeting tax-evaders and offshoring enablers, which would not be an entirely bad thing, and IMO this is the real reason why many wealthy Americans and some companies such as Apple will be screaming loudly a bout USG spying on un-indicted Americans.)
RACECAR is an odd term in context. Racing cars are very loud and flashy. Sponsors of race cars want the cars not only to be seen but to be impossible to ignore. Tor users? Not so much...
IMO there is no denying that DARPA exists to enable the US military to execute invasions, signature drone strikes, covert Special Forces operations including kidnappings and assassinations, cyberattacks on individuals and nations, and more. This agenda is utterly contrary to the goals of the most endangered Tor users. This is why TP should work to avoid any more funding from DARPA or other US military/intelligence entities, including companies such as Palantir.
It is also worth comparing…
It is also worth comparing TP budget (low millions) to NSA budget (tens of billions). And our foes include not just the governments but the companies which sell malware to those governments! Just look at the prices at this leaked solitication of the Israel-based cyberespionage-as-a-service company known as Candiru Ltd (and by many other names):
https://www.themarker.com/embeds/pdf_upload/2020/20200902-161742.pdf
1.5 million Euros to spy on just 15 targets in just one adversary nation, whee!
It is worth noting that some of the best information about Candiru, Cellebrite, NSO Group, and many lesser known Israeli cyber-surveillance-as-a-service companies can be found in news stories published by the fearless journalists working for an English language Israeli newspaper, Haaretz. The companies are headquartered in Israel and boast of hiring former Unit 8200 hackers, but often operate from countries such as Peru (for Latin American targets) and Cyprus (for Middle Eastern targets).
With all that money, why not…
With all that money, why not implement the hybrid verifiable shuffle for exit nodes and authentication encryption for relays mitigate attacks on the tor network. These attack mitigations are documented here: https://people.csail.mit.edu/devadas/pubs/riffle.pdf If you want to improve the Tor network speeds, why not allow human readable blockchain domain names and opt-in advertisements paid for with privacy coins. A commercial incentive to operate Tor nodes would attract more servers, thus making the network more resilient. Or, you could implement an instant messenger based on Bitmessage, implemented using v3 onion addresses.