Categories: IntelligenceSecurity

PRISM repercussion on the Tor network accesses

The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure.

The use of Tor Network to preserve user’s anonymity and to avoid government surveillance, we discussed this topic several times explaining that through the analysis of Tor metrics data it was possible to study the effect of political events in the cyberspace. Cyberspace and ordinary life are directed linked, a disorder in the every part of globe has its repercussion on the cyber domain and viceversa. Analyzing the use of Tor Network it is possible to detect social protests or censorship/surveillance applied by any government.

The event that most of all has captured the media attention in the last months is the disclosure of the PRISM surveillance program made by Edward Snowden. The revelation of the Guardian highlighted also an intense collaboration between the U.S., the U.K., New Zealand, Australia, Canada, a group of governments dubbed  the “Eyes’ group” due their surveillance activities.

Which is the impact of PRISM disclosure on the Tor Network usage?

Let’s start from the use of Tor Network made by internet users in these 5 countries.

 

Tor Network users USTor Network users US

The data displayed by the graphs are eloquent, the number of users is doubled on a global scale, almost in every country where the government has been mentioned by Snowden’s reveals the number of Tor Network users is increased as never before.

Population is increasing the awareness of the anonymous online Tor network and are exploring its use to avoid surveillance activities of their governments.

It’s easy to note that Tor Network users exploded on Aug. 20, just a couple of days after that David Miranda, Guardian journalist and blogger Glenn Greenwald’s partner was detained by UK law enforcement at Heathrow Airport for around nine hours.

Tor Network, despite is often considered the reign of cybercrime,  is a precious resource for activists, journalists and dissidents to conceal their online activities from snoops.

It must be considered that governments are actively working to try to track users also within the Tor Network. Governments are trying to detect methods of attack that could expose the user’s identity once in the network. Recently we read about the possible exploit of a vulnerability within the Firefox browser commonly used to surf within the Tor network, but many other researchers are working on the topic, track Tor users is the next challenge and probably someone is already able to do it. Governments could count also on the support of the ISPs (Internet Service Providers) that are already able to detect Tor usage on their networks.

Another couple of data could be interested to evaluate the repercussion of PRISM case on the Tor network:

  • The number of relays is growing steadily.
  • Terms related to the PRISM case and to Snowden are still unpoular in the deep web, I found the data using the dashboard designed for the Artemis Project.

 

Another element of interest that might be missed by many is that the Tor project has among its principal financial sponsors the U.S. Government. It is known that the project was created by DoD, but why fund it today if the alleged anonymity of its networks could be a source of problems?
Philanthropy?…

Pierluigi Paganini

(Security Affairs – Tor Network, PRISM)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Pwn2Own Berlin 2025: total prize money reached $1,078,750

Pwn2Own Berlin 2025 wrapped up with $383,750 awarded on the final day, pushing the total…

4 hours ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

1 day ago

Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…

1 day ago

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…

1 day ago

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials

FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S.…

2 days ago