{"id":8457,"date":"2020-03-18T22:32:41","date_gmt":"2020-03-18T20:32:41","guid":{"rendered":"https:\/\/forklog.media\/?p=8457"},"modified":"2020-03-26T15:05:38","modified_gmt":"2020-03-26T13:05:38","slug":"tor-and-telegram-under-scrutiny-will-russia-kill-anonymous-internet","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/tor-and-telegram-under-scrutiny-will-russia-kill-anonymous-internet\/","title":{"rendered":"Tor and Telegram Under Scrutiny: Will Russia Kill Anonymous Internet?"},"content":{"rendered":"<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Federal_Service_for_Supervision_of_Communications,_Information_Technology_and_Mass_Media\">Roskomnadzor<\/a> is closely <a href=\"https:\/\/ru.scribd.com\/document\/451025109\/%D0%A2%D0%B5%D1%85%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D0%BA%D0%BE%D0%B5-%D0%B7%D0%B0%D0%B4%D0%B0%D0%BD%D0%B8%D0%B5\">studying<\/a> anonymous and decentralized networks that enable bypassing the blocks imposed by the department. The ultimate goal of this study is to restrict access to such networks at the legislative level.<\/p>\n<p><!--more--><\/p>\n<p>Tor browser, the Telegram Open Network platform, and a number of other networks based on anonymous secure connections are at risk.<\/p>\n<p>The job was entrusted to the Federal Research Center &#8220;Informatics and Management&#8221; at the Russian Academy of Sciences. The government will allocate 9.2 million rubles ($110,000) to the research. The deadline for submitting the report is June 30, 2020.<\/p>\n<p>In this piece, we explain why Tor and Telegram are popular in Russia and figure out how real the threat is.<\/p>\n<h2>Government blocking Tor and Telegram? We\u2019ve Seen This Before<\/h2>\n<p>Since November 2017, a <a href=\"https:\/\/regulation.gov.ru\/projects#npa=79017\">law<\/a> has been in force in the Russian Federation, requiring the owners of the so-called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Anonymizer\">anonymizers<\/a> to block access to prohibited sites. Telegram messenger has been blocked in the country by a court decision since April 2018, albeit <a href=\"https:\/\/www.intellinews.com\/one-year-after-ban-telegram-still-accessible-from-russia-with-growing-audience-160502\/\">unsuccessfully<\/a>.<\/p>\n<p>According to the leader of the public organization <a href=\"https:\/\/en.wikipedia.org\/wiki\/Roskomsvoboda_(organization)\">Roskomsvoboda<\/a> Artyom Kozlyuk, the law on anonymizers was meant to force various proxy and VPN services to cooperate with the Russian authorities and to enable the regulator to shut them down in case of refusal.<\/p>\n<blockquote><p><b><i>\u201cThis law has not been enforced until today, despite the fact that it entered into force more than two years ago. In March 2019, Roskomnadzor sent a <\/i><\/b><a href=\"https:\/\/rkn.gov.ru\/news\/rsoc\/news66248.htm\"><b><i>notice<\/i><\/b><\/a><b><i> to ten major VPN services with a request to observe the list of banned sites. All the services, except for Kaspersky Secure Connection, refused, but Roskomnadzor didn\u2019t do anything to them at the time,\u201d <\/i><\/b><i>said the expert.<\/i><\/p><\/blockquote>\n<p>The current study, according to Artyom Kozlyuk, is being carried out as part of the implementation of the \u201c<a href=\"https:\/\/www.bbc.com\/news\/technology-50902496\">sovereign Runet<\/a>,\u201d Russia\u2019s take on an isolated domestic internet.<\/p>\n<blockquote><p><b><i>\u201cRoskomnadzor wants to study specific technologies that are difficult to block by brute force or crack, as they are cryptographically secure. Based on this analysis they will try to manufacture hardware and software systems for filtering traffic or \u2018jamming the signal,\u2019 if it is at all possible,\u201d <\/i><\/b><i>he added.<\/i><\/p><\/blockquote>\n<p>Such an approach will render the blocking process completely non-transparet, the expert warns:<\/p>\n<blockquote><p><b><i>\u201cIf the authorities gain access to some kind of equipment that can detect and limit certain kinds of traffic, there will be no need to keep a separate register of banned sites and upload this data to telecom operators.<br \/>\n<\/i><\/b><b><i><br \/>\n&#8220;Lists may exist in parallel, but at the same time, no one will know why this or that service suddenly stopped working. If Roskomnadzor implements this practice of off-registry blockings, there will be even more confusion.\u201d<\/i><\/b><\/p><\/blockquote>\n<p>The leader of Roskomsvoboda also questions the effectiveness of this non-trivial method.<\/p>\n<blockquote><p><b><i>\u201cI\u2019m not sure that we will experience this in the coming months, or even years. Individual elements can be felt quickly. But the \u2018switch\u2019 that Roskomnadzor was given under the sovereign Internet law will likely be only used in case of mass unrest, and we will see a large number of regional shutdowns.\u201d<\/i><\/b><\/p><\/blockquote>\n<p>Roskomnadzor explains the new tender by the need to develop tools to block prohibited information. The list of technologies being studied, according to the document, will include the Invisible Internet Project (I2P), The Onion Router (TOR), Telegram Open Network, Freenet, Zeronet, anoNet, as well as the mesh networks Yggdrasill, cjDNS, Briar, Signal Offline, and FireChat.<\/p>\n<p>VPN technology was not mentioned. According to GlobalWebIndex service, VPN is used by a quarter of Russians.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/07-1.jpg\" alt=\"VPN usage for anonymous browsing by country\" width=\"600\" height=\"800\" \/><\/p>\n<p style=\"text-align: center;\"><i>VPN usage for anonymous browsing by country. Source: GlobalWebIndex<\/i><\/p>\n<p>This discrepancy was noted by the ex-Telegram Special Directions Director Anton Rosenberg.<\/p>\n<blockquote><p><b><i>\u201cThe terms of reference contain a large list of technologies and protocols that need to be analyzed. Not all of them are popular, not all are used to bypass blocks. Perhaps they were added because the authors of the document did not understand very well how things worked, or to obfuscate, cover up some specific items of real interest to the customer, or even simply to create a facade of large and complex work to justify the allocated amount of funds,\u201d <\/i><\/b><i>he said in a <\/i><a href=\"https:\/\/www.kommersant.ru\/doc\/4283873\"><i>comment<\/i><\/a><i> to Kommersant.<\/i><\/p><\/blockquote>\n<h2>How Is Tor Browser Different From Other Browsers?<\/h2>\n<p>Tor is an overlay network, an additional layer on top of the existing Internet infrastructure. It provides features that were not originally envisaged by the developers of traditional network protocols (TCP\/IP).<\/p>\n<p>Circumventing blocks appears to be Tor\u2019s bonus feature, according to the Roskomsvoboda consultant Leonid Evdokimov. The Tor network is built in such a way as to not be able to distinguish between users and not collect their personal data.<\/p>\n<blockquote><p><b><i>\u201cThe network cannot \u201clabel\u201d the user with the list of blocks since it can not determine his country and jurisdiction. Filtering is relegated to the \u201coutput nodes\u201d in accordance with their local legislation,\u201d<\/i><\/b><i> the expert explains.<\/i><\/p><\/blockquote>\n<p>Another useful feature of Tor is the impossibility of retargeting, a.k.a. re-displaying ads.<\/p>\n<blockquote><p><b><i>\u201cAnonymity in the era of ubiquitous advertising networks is useful when buying gifts for family members. Imagine that you are choosing a gift for your wife\/husband, and a few hours later your partner is shown an advertisement for this gift. This can kill the surprise, and Tor can help prevent it,\u201d<\/i><\/b><i> adds Evdokimov.<\/i><\/p><\/blockquote>\n<p>And although anonymity and privacy are the main features of the Tor browser, they are not absolutely guaranteed, says Stanislav Shakirov, technical director of Roskomsvoboda.<\/p>\n<blockquote><p><b><i>\u201cEven using Tor you can be deanonymized. For example, if you use the browser to log in the social media accounts.&#8221;<\/i><\/b><\/p><\/blockquote>\n<h2>Why Is Tor\u2019s Audience Growing in Russia?<\/h2>\n<p>Russia holds second place in terms of Tor users, after Iran. Over the past year, a little more than <a href=\"https:\/\/metrics.torproject.org\/userstats-relay-table.html\">330 thousand<\/a> Russians used the browser daily, which is 17.39% of the total number of users.<\/p>\n<p><a href=\"https:\/\/forklog.com\/wp-content\/uploads\/userstats-relay-country-ru-2019-03-16-2020-03-16-off-e1584383765753.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/userstats-relay-country-ru-2019-03-16-2020-03-16-off-e1584383765753.png\" alt=\"Directly connecting users from Russia\" width=\"820\" height=\"513\" \/><\/a><\/p>\n<p><i>Directly connecting users from Russia. Source: The Tor Project<\/i><\/p>\n<p>However, this is still ten times less than the number of Russian Telegram users. According to the research company Mediascope, in August 2019, the daily Russian audience of the Telegram mobile application approached 4.4 million people.<\/p>\n<p>Most of the Tor traffic in Russia is Hydra darknet marketplace traffic, says Ksenia Yermoshina, Center for Internet and Society CNRS and Citizen Lab research fellow.<\/p>\n<blockquote><p><b><i>\u201cThe reasons for the growth of the Tor audience may be related to the blocking of popular services and the popularity of platforms located in the .onion domain (like Hydra). If the number of people arrested for reposts or publications is growing in the country (and the authors of such posts are often identified by IP address), we can expect that Tor user base will also grow,\u201d <\/i><\/b><i>she said in a comment to ForkLog.<\/i><\/p><\/blockquote>\n<p>At the same time, high-quality VPN services can easily steal Tor\u2019s audience, whose goal is to bypass blockings or maintain anonymity by changing the IP address.<\/p>\n<blockquote><p><b><i>\u201cVPNs are usually more convenient, faster, and less clunky when viewing videos and other multimedia content. Once people find out about good VPN services, many would rather switch to them than use Tor. Journalists are a good example to illustrate this, as their work is crippled without fast connection and the ability to open video and photos. They need javascript, which is turned off by default in Tor. If there is an option for the editorial office to provide licenses for a VPN or a good free\/cheap VPN (for example, Psiphon, PIA), then they will prefer a VPN,\u201d<\/i><\/b><i> concluded Ksenia Ermoshina.<\/i><\/p><\/blockquote>\n<h2>Are Roskomnadzor\u2019s Threats to Block Tor Real?<\/h2>\n<p>According to Tor employee Diana Azaryan, blocking Tor is feasible, which was already proven in several countries. In September 2009, Chinese authorities blocked the public list of Tor relays using simple IP blocking. About 80% of public network nodes were censored.<\/p>\n<p>In 2012, Iran and China began to use DPI (deep packet inspection) to block the Tor Project network. There have also been blocks in Kazakhstan and Ethiopia.<\/p>\n<p>Yet even in the event of a blocking campaign, the Tor network will continue to operate.<\/p>\n<blockquote><p><b><i>\u201cUsers will still be able to connect to the network through bridges (private nodes). Even if the main Tor Project site is blocked, there are other ways to get bridges. You can also use the Pluggable Transports technology, which masks the traffic, making it indistinguishable from the \u2018normal\u2019\/allowed traffic,\u201d <\/i><\/b><i>said Diana Azaryan.<\/i><\/p><\/blockquote>\n<p>According to Diana, there are several types of interchangeable transports that follow a single specification. For example, \u201cmeek\u201d transport was created specifically for residents of China.<\/p>\n<p>The easiest way to limit access to the Tor browser is to block bootstrap nodes \u2014 a special \u201chard-wired\u201d address in the program from which the initial configuration for the overlay network program is loaded, continues Leonid Evdokimov:<\/p>\n<blockquote><p><b><i>\u201cWith some degree of success, Tor, I2P, and DHT torrent clients can be blocked in this way. This tactic will work well until clients for overlay networks begin to actively \u2018resist\u2019 blocks.&#8221;<\/i><\/b><\/p><\/blockquote>\n<p>That being said, he reminded about the unfortunate consequences of previous blocks in Russia:<\/p>\n<blockquote><p><b><i>\u201cAny threat can be realized, the only question is the amount of collateral damage. And Roskomnadzor is not very worried about the latter. We already saw this in April 2018, when in an attempt to block Telegram, the department blocked Google and many Amazon networks, breaking the functionality of Slack, Ted.com and millions of other sites,\u201d<\/i><\/b><i> says Evdokimov.<\/i><\/p><\/blockquote>\n<p>Given the fact that the Russian Academy of Sciences is involved with the study, there may be temporary successes in blocking the Tor browser on the territory of the Russian Federation, but overall the threat is illusory, believes Alexander Isavnin, representative of the Internet Protection Society.<\/p>\n<blockquote><p><b><i>\u201cOverlay networks are evolving significantly faster than they can be blocked. They will overhaul their inner workings and the results of the &#8220;research&#8221; will become irrelevant. Not to mention that 9 million rubles by Russian standards is a paltry sum. There is no way a strong study can be conducted with such level of financing,\u201d<\/i><\/b><i> the expert concluded.<\/i><\/p><\/blockquote>\n<p><b>Follow us on\u00a0<\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b>\u00a0and\u00a0<\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b>\u00a0and join our\u00a0<\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b>\u00a0to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Roskomnadzor is closely studying anonymous and decentralized networks that enable bypassing the blocks imposed by the department. The ultimate goal of this study is to restrict access to such networks at the legislative level.<\/p>\n","protected":false},"author":6,"featured_media":8459,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1107],"tags":[573,96,94,723,49],"class_list":["post-8457","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-occupy-the-internet","tag-privacy","tag-roskomnadzor","tag-roskomsvoboda","tag-telegram","tag-tor"],"aioseo_notices":[],"amp_enabled":true,"views":"675","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=8457"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8457\/revisions"}],"predecessor-version":[{"id":8461,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8457\/revisions\/8461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/8459"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=8457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=8457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=8457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}