Is Tor still safe to use?

Context: German Investigation & Ricochet Case

  • Discussion centers on a German TV report alleging a timing-based deanonymization of an onion service (Boystown CSAM forum) between ~2019–2021.
  • Tor Project blog says: likely a guard-discovery attack on a user of an old Ricochet client lacking Vanguards(-lite); mitigations have existed in Ricochet-Refresh since 2022.
  • Technical details from NDR/CCC are limited or not shared with Tor; several commenters flag this lack of transparency as a problem.

“Is Tor Safe?” – Threat Model Framing

  • Many stress “safe for whom, against whom?”
    • Against local ISPs, adtech, basic law enforcement, and many non-Western regimes: Tor is seen as significantly safer than plain internet or most VPNs.
    • Against well-resourced Western intelligence (NSA, Five Eyes, Mossad, etc.): several argue you should assume they can sometimes deanonymize users, especially targeted ones.

Guard Discovery, Timing & Correlation Attacks

  • Known weaknesses: traffic analysis using packet size/timing, guard discovery, and flow-correlation, especially for onion services repeatedly contacted.
  • Vanguards (entry + middle guard design) aim to make these attacks more expensive but not impossible; mitigations shift economics, don’t “fix” the problem.
  • Some propose additional obfuscation (VPNs with padding/shaping, more hops, aggressive padding), but others note performance and practicality issues.

Relay/Exit Node & Global Adversary Concerns

  • Long debate about whether governments run “most exits” or a large fraction of relays; concrete evidence is scarce, but metrics show many relays in 14‑Eyes countries.
  • Tor community does active bad-relay detection and relay governance; still, commenters consider large-scale relay control or IXP fiber taps realistic for state actors.
  • Important nuance: exits are irrelevant for onion services; their main risk is correlation, not exit logging.

US Government Funding & “Honeypot” Fears

  • Tor’s origins in US Naval Research and majority US-government funding trigger suspicion for some, who see Tor as a possible “NOBUS” or honeypot.
  • Others counter: US agencies also need strong anonymity tools; funding doesn’t prove backdoors, and there’s no visible mass-arrest pattern attributable to breaking Tor’s core design.

Legitimate Uses, Crime, and OpSec

  • Use cases cited: bypassing censorship, anonymous journalism/whistleblowing (e.g., SecureDrop), avoiding tracking (e.g., via onion mirrors of major sites), NAT traversal.
  • Many arrests of Tor users are attributed in the thread to endpoint compromise, zero-days, metadata (who used Tor when), or blatant operational mistakes, not Tor protocol breaks.
  • Consensus: nothing is 100% safe; Tor remains the best widely deployed option for practical anonymity, but users must understand limits and risk tolerance.