top | item 10938103

TorFlow

261 points| bemmu | 10 years ago |torflow.uncharted.software

71 comments

order
[+] pierrec|10 years ago|reply
Very classy visualization! Have a look at the code that determines the visual flow of data between relays: https://github.com/unchartedsoftware/torflow/blob/master/pub...

I think it doesn't exactly reflect how paths are chosen based on relay bandwidth scores, if we compare to the actual path selection algorithm: http://tor.stackexchange.com/a/114

I might be missing something, but it seems that relay same-family and same-/16-subnet exclusions are ignored. This might bias the visualization to increase the apparent traffic between popular nodes, while in reality, the traffic should be slightly more evened out with less popular nodes. Hard to tell if this effect makes any visible difference without analyzing the data, though. Either way, because of the way the code is structured, it shouldn't be too hard to fix: just simulate full paths instead of single connections between nodes.

[+] khgvljhkb|10 years ago|reply
Clear proof TOR is used by the evil one, and that cryptography should be banned: http://i.imgur.com/NXT0OOJ.png
[+] comboy|10 years ago|reply
Brightest spots in capitals are probably caused by IP geolocation. Whois for many IPs returns main ISP HQ address which usually is based in the capital city. Also, geolocation tools will return capital city if no specific information other than country is available.

I think they could improve they ip2address tool, because I would expect some bright spot at hetzner datacenter and it's not there (while whois for IPs of my servers there returns proper location of the datacenter).

Nevertheless, awesome visualization.

[+] stryk|10 years ago|reply
No idea how good the data is, I assume it's good, but in my mind this is impressive just on the visual representation of it alone. What a fantastically beautiful display of information, the UI is great all around!
[+] a3n|10 years ago|reply
One suggestion for the UI: when you click a + on an option, the minus should be at the bottom of the expanded option, so that you don't have to move the mouse to close the expansion.
[+] mih|10 years ago|reply
A disproportionate amount of traffic seems to be passing through Monrovia, Liberia compared to the rest of African continent and even more developed places like Australia. Can anybody shed some light on this ?
[+] neerdowell|10 years ago|reply
That traffic is from IPredator's relay, which is currently the top exit node by consensus (https://globe.torproject.org/#/top10).

There are less than 50 relays in Australia and none of them come close to IPredator. Every AU relay combined has a middle probability of 0.0246% and an exit probability of 0.0060%.

IPredator alone has an exit probability of 2.1961%.

(You can see these stats with Tor Compass: https://compass.torproject.org/)

[+] msvan|10 years ago|reply
IPredator is a Swedish VPN service that appeared when the "Ipred" law was passed in Sweden, a law that was passed to allow rights holders to find and prosecute people who torrent stuff. So most likely, it's used for piracy.
[+] saosebastiao|10 years ago|reply
I also noticed a weird conglomeration somewhere in Kansas near Witchita. Someone's pet project?
[+] ithinkso|10 years ago|reply
I'm wondering the same thing, would be interesting to hear if there is some reason behind this.
[+] rapht|10 years ago|reply
Does anyone find it surprising that Europe seems to have comparatively more nodes/traffic flow than the US?
[+] dylz|10 years ago|reply
There are huge amount of peered ISP that offer cheap servers.

OVH and Free Telecom probably host a huge amount of Tor traffic in FR. Easily do 300 Mbps 24x7 for sub-$15/m dedicated server.

OVH also has subsidiaries in other EU countries that will geolocate back to those countries (hosted in FR physically).

[+] enedil|10 years ago|reply
The US population is more than 2 times smaller than the European one, so it makes completly sense to me.
[+] Grue3|10 years ago|reply
In general, Internet in Europe is much more censored than in the US.
[+] uxwtf|10 years ago|reply
Flow looks like transatlantic connection with epicenter in Europe
[+] yk|10 years ago|reply
Whats the nexus in Germany north of Frankfurt? (My guess is, that it is Hetzner, but can anybody comment?)
[+] luchs|10 years ago|reply
I don't think there's a data center there, it's probably just where all nodes in Germany end up which don't have more accurate geolocation.
[+] niij|10 years ago|reply
Here's the summary: IP Geolocation is at best inaccurate.
[+] aw3c2|10 years ago|reply
Addendum: Not actual traffic flows but simulated with an undescribed model.
[+] detaro|10 years ago|reply
How was this data collected? Doesn't this require all the relay operators sharing their connection data?
[+] niij|10 years ago|reply
No, this information is publicly available when your Node joins the Tor network. All nodes (except for a limited set of entry-nodes) are publicly listed as being a part of the Tor network. Their IP addresses are used to approximate their location based on where the IP address is registered.
[+] Thriptic|10 years ago|reply
What's going on in Kansas?
[+] chatmasta|10 years ago|reply
Kansas has some big data centers in it (there's a reason google fiber launched there). Lots of dedicated server and colocation providers are located in Kansas City. In order for these providers to receive IP addresses from ARIN, they must register with ARIN as an "autonomous system" (AS). One of the items on the form they must complete is the geolocation of the IP address block they are being assigned. That geolocation is often the location of the provider company, not necessarily the location of the server(s) the IP(s) point to.

Server providers register as autonomous systems, and purchase IP space in large blocks. They often have servers at multiple data centers, with VLAN routing configured to switch packets at the ingress IP to whichever server that IP is assigned to. When a client rents a server from a provider, the provider assigns the client some number of IP addresses from its available pool. Many times, the provider does not actually SWIP (officially delegate via ARIN) these IP addresses to the client, so the registration with ARIN will not reflect the owner of the server an IP currently points to.

tl;dr When a packet goes to an IP belonging to an AS registered with a certain geolocation, the AS can switch that packet to wherever it wants.

[+] anc84|10 years ago|reply
Geolocating IP addresses is very flawed and making maps from such data is bad science.
[+] finnn|10 years ago|reply
While the other commenters may be correct and seem to know more about this than I, almost every time I've seen stuff geolocate to "Kansas" it's geolocating to the United States, with no further level of detail available. The mapping software finds the geographic center of the United States (which is somewhere in Kansas) and puts it there
[+] incredulousk|10 years ago|reply
anyone else think it is curious that there is hardly any Tor traffic in/out of Seattle? You would think with the high density of tech-types, and proximity to pacific links, that there would at least be something?
[+] emilburzo|10 years ago|reply
If anyone else is seeing a page with just a map (and nothing moving), you probably have webgl disabled
[+] jorgecurio|10 years ago|reply
I see connections coming out of north korea....
[+] drakenot|10 years ago|reply
I'm surprised by how dark Australia is. I at least expected the coastal cities to be lit up.
[+] jandrese|10 years ago|reply
I suspect this is partly due to how notoriously overpriced and under-performing Australian internet access is.
[+] x1798DE|10 years ago|reply
I'm wondering if this might because Australia has less traffic per node, so most of the Australian nodes aren't reaching the display threshold (top 500 or whatever nodes).
[+] aw3c2|10 years ago|reply
This is traffic between relays, not Tor users.
[+] pavki|10 years ago|reply
I don't trust Tor because of exit nodes.
[+] Forbo|10 years ago|reply
Then you're missing half of the point of Tor, the other half being hidden services which don't require an exit node at all.
[+] lindx|10 years ago|reply
Can you elaborate?
[+] rnhmjoj|10 years ago|reply
If you use encryption you don't need to.