Tor Is Not Just for Anonymity

Preamble

Anonymity, privacy, and security. All good things, you’ll agree if you’re reading this post. But what we can’t all quite agree on is where one stops and the next begins.

It is my opinion that security is an umbrella term: a more general word that encompasses both of the others. Everything that makes you more anonymous (or private) also makes you more secure.

There is a notion that comes up every now and then that Tor doesn’t make you more secure, but it only makes you anonymous. This is obviously not true under my definitions of the terms (if it makes you anonymous, it by definition of the words must also make you more secure). But here I’ll strive to convince you that even if you disagree with my definitions, there are benefits to Tor onion services that cannot be construed as anonymity.

The setup

The framing for this is two scenarios. Either you (1) visit a website on the regular web using TLS (HTTPS), or (2) visit a regular onion service. Everything in both scenarios is setup in a typical/sane way. Here are the assumptions:

Tor onion services are not limited to being HTTP servers (they could be IRC, SMTP, or any other TCP-based daemon), but in this post we ignore everything but HTTP servers.

Tor benefits that I’d consider anonymity

Tor benefits that are not anonymity

If it looks like you’ve successfully connected to an onion service, you have and you have done so securely. TLS offers no such guarantee.

Moving on…

Oh, you’re just continuing to describe a reimplementation of Transport Layer Security.

No, I’m not. To restate what I’ve exhaustively said above:

  1. TLS isn’t used in every part of the process of connecting to a regular website. Tor makes the whole process secure.

  2. TLS tries its best to ensure your link is secured, but Tor guarantees it. With TLS you have to make assumptions you shouldn’t have to make in order to believe it is working. Or put another way: Tor requires fewer assumptions, so Tor is more secure.

Accessing Tor onion services is designed to be more secure than accessing something over TLS.

TLS has patches upon patches trying to make it better: Certificate Transparency, HSTS, OCSP … These help! Absolutely these make TLS better and more secure.

But Tor is more secure. Every onion service is secure and you make fewer assumptions.

Will the next regular website you visit use HSTS? If you check after you connect in order to determine the answer, and you find that it isn’t using HSTS, is that because you’re being attacked or does the site legitimately not use HSTS?

Does your browser check CT logs, and if it does, what does it do in response to failing to find the certificate in CT logs? Do you assume the CT lookup process is secure? Are the parties you’re communicating with misbehaving? Are your lookups in CT logs being logged and associated with you?

Tor is not just for anonymity. It provides real, measurable, enumerable security benefits over TLS.