Enterprise IT Security tends to lose its shit when their endpoint protection finds #Tor browser on employees' devices.
Unless you do deep packet inspection / middlebox all traffic, I don't see a meaningful risk increase. (If you do, then it seems comparable to e.g., Apple Private Relay + browsers' DoH use.)
Does anybody have a good summary (not written by a VPN vendor) on the actual risk to the enterprise from its use by average users (not attacks on Tor itself, nor running a Tor node)?
Paul_IPv6
in reply to Jan Schaumann • • •just off hand:
- exfiltration of company IP would be harder to catch
- tunnel/VPNs are two way, so you're putting a tor node and whoever is on it on your internal network behind the firewall
Jan Schaumann
in reply to Paul_IPv6 • • •@paul_ipv6 detection of exfiltration would require deep packet inspection; if you don't do that, then exfil without Tor using any other encryption mechanism is trivial (although you can see that traffic goes to e.g., an AWS endpoint?).
I also don't follow the second point; to the best of my knowledge, Tor circuits are not bidirectional, meaning a tor node cannot initiate traffic to my client any less than a website out there can initiate a connection to my non-tor browser. ?
Paul_IPv6
in reply to Jan Schaumann • • •you can't use tor without client initiation but if the client device is infected?
i hate the whole "IT owns your phone and everything on it" but i do sympathize with IT folks that don't want devices they don't own on their internal network.
so, perhaps it's better to say the risk isn't tor but allowing non-IT controlled devices on your internal network in general.
Jan Schaumann
in reply to Paul_IPv6 • • •Paul_IPv6
in reply to Jan Schaumann • • •Jan Schaumann
in reply to Paul_IPv6 • • •Paul_IPv6
in reply to Jan Schaumann • • •sure. tor is no worse than any form of encrypted traffic, even HTTPS.
so, i'm back to that the risk is uncontrolled/unmonitored end devices on your network. so if your argument is that tor is no worse than any other encrypted data stream, sure.
Jan Schaumann
in reply to Paul_IPv6 • • •Wes George
in reply to Paul_IPv6 • • •I am not advocating for this model but the general rule of thumb is don't do anything personal on company devices, because because in addition to being issued solely for you to do your job, you don't really have a right to privacy on them.
Jima
in reply to Wes George • • •Nathan Arthur
in reply to Jan Schaumann • • •I think of tor as something people use when they feel like they need to hide something. Like actively explicitly have something to hide. So finding it on a corporate device would be concerning. At least it suggests high risk behavior.
I know that’s not always why people use it. And people do all sorts of stupid things without tor. But taking the time to set it up suggests a motivation to hide something. On a corporate device, that’s worrying.
Jan Schaumann
in reply to Nathan Arthur • • •@narthur Strongly disagree. Valuing privacy is not "having something to hide". (That argument didn't fly when Google's Eric Schmidt tried to bring it back in 2009.)
Would you likewise assume that anybody wanting to use TLS or SSH to encrypt traffic in transit "has something to hide"?
Nathan Arthur
in reply to Jan Schaumann • • •yeah but you don’t really need tor until your threat model is “a government” (ie the law). Otherwise there are already other - easier - ways to protect your privacy. Its use suggests a goal beyond simple privacy.
Yes, tor is just a tool and some people will use it for good reasons, or just to be totally sure of privacy. I don’t think it’s automatically a sign of wrongdoing. But I understand the worry.
Jan Schaumann
in reply to Nathan Arthur • • •Nathan Arthur
in reply to Jan Schaumann • • •it’s been a long time since I used tor - isn’t it generally slower and regularly causes problems with sites? If not, then yeah, maybe the cost/benefit of tor is more balanced than I realized.
For me, Brave browser and a vpn would cover all those things, to my comfort level. And I expect most non-technical users have had vpns shoved down their throats in ads, but have never heard of tor.
So if your user is in IT, maybe it’s more normal. If they’re in marketing, maybe less.
Nathan Arthur
in reply to Jan Schaumann • • •Tim WIcinski
in reply to Jan Schaumann • • •Not Enterprise IT Security, but they have all turned into checking compliance boxes for their insurance coverage than actual security.
Also, no company wants to get outed as having employees with highly illegal contents on their computers.
Jan Schaumann
in reply to Tim WIcinski • • •Chris Siebenmann
in reply to Jan Schaumann • • •silverwizard
in reply to Jan Schaumann • •S.P.Zeidler
in reply to Jan Schaumann • • •