TOR access in China

I have a coworker from China who is heading back in about a week. This is his first time in the US and while here he decided to look up all the rumors about his government that he’s heard about (Tiananmen square, Uyghurs, etc.).

He found TOR and a bunch Chinese language Onion sites with the information he wants access to while back home in China. He’s confident he can get the installation software into China.

The issue is he keeps getting conflicting information on whether or not he will be able to access onion sites once back home. So does anyone know if TOR will be any use to him in China? Is there some special setup he needs to do for it to work there?

He is also concerned about his actions being figured out (China having spoof bridges or something like that). He is also concerned China may be hosting one of these information sites hoping for people to download something to track them.

His plan is to screen shot data, and use screen recording software for videos. So if he is able to access the Onion sites using the TOR browser can he be tracked by just visiting sites with text, images and watching videos? How safe is it for him to use?

We’ve read how TOR’s security works on the TOR FAQ page but we have our concerns. Reading how it works the samples show just 2 bridges, this seems pretty simple to track down, especially if one is compromised, in reality are there a lot more bridges? Basically would the government need a team of people working to track him down, or is this something one skilled tech would be able to trace him in an afternoon?

EDIT: I have shown my friend all this information and he appreciates the help. We fortunately have a large Chinese population in my city, and he was able to connect with someone who is willing to work with him and show him how to get everything set up.

I feel he is taking a pretty big risk, but he stated that the only people the government goes after are the ones who actively spread this information, he stated everyone knows it, everyone believes it, but no one talks about. He just wants the facts.

If he lived in the US we would consider him a ‘Government Conspirast’. But overall he is pretty smart, and I think he’ll use an appropriate amount of caution. I think he will be fine.

As far as I am aware, Tor traffic is monitored in China.

TOR data is very recognizable at the packet level, and it is easily tracked. Since tor is outlawed in China, simply using tor will get you in serious trouble, regardless of what you are looking at (which they will find when they search your residence and devices after discovering your TOR traffic).

First of all, I hope your coworker will be safe. That being said, the average person doesn’t need to be too paranoid, ie it’s not like North Korea in China. Tor is not illegal in China but VPNs are, and Tor would probably be considered a VPN. Even though VPNs are illegal, nobody has been arrested for using one yet, its an open secret that basically anyone who has to conduct important business with foreigners will use them, and even the great firewall’s inventor has used one in public. I’d imagine this is because there are too many VPN users to police, and the same would probably apply to Tor. My guess is that unless your coworker is an IRL dissident or anti-CCP journalist, etc. the government won’t care about their Tor usage specifically. Lots of Chinese people learn about tiananmen, uigher genocide etc when going to the west and that probably won’t get you arrested (unless you speak out in public) too - that’s probably where the rumours come from. I don’t know how strict the border security is going into China currently, but all they have to do is convince them not to search their files, USB stick, etc. Even if border security seizes the installation, its not that big of a deal because they could just use a regular VPN then install Tor from there. So, the hiding in a coin trick another redditor suggested is probably overkill and might get you arrested for defacing currency.

Regarding the Chinese active targeting: AFAIK China doesn’t try to infect people with malware when using hidden services. However, downloading and running things from random onion sites isn’t advisable anyway, so they should be careful regardless. The only sort of “active censorship” China does on Tor is various shenanigans to block bridges that goes beyond simply scanning traffic - e.g. spamming the “give me bridges” button, using machine learning to find probable bridge connections and spoofing connections to the suspected bridge to find out, etc. Some research on this can be found here

Regarding special setup: the other commenters have linked to good resources, most of the info about what works and what doesn’t comes from word of mouth so your coworker might want to find Chinese citizens in chatrooms on the dark web to share strategies to bypass the GFW. Meek and Snowflake proxies (both built into Tor) sometimes work and sometimes don’t, and its important to update often so when they do work your coworker gets them working as well as possible. Various fancier bridges have been developed for the GFW, and some regular VPNs have been made specifically to bypass the GFW. Popular solutions include shadowsocks vpn, softether VPN, trojan-gfw, and many more. I haven’t researched this in a while, so your coworker might want to look into more esoteric methods. For now, this list is a great place to start. Additionally, if your coworker is willing to pay for server hosting in the West, they can simply host an SSH server and use that as a proxy - almost undetectable unless they block all SSH servers, which wouldn’t be good for businesses who need it.

Regarding getting hacked: Tor is just a browser, and you can’t get hacked from visiting a website, unless there is a vulnerability in the website or a 0 day in a browser. The first one allows stealing cookies and other related info, which isn’t relevant if you’re just reading/watching stuff and not logged in to anything important (obviously, big sites won’t have as many of these bugs, and if China discovers one it is more advantageous to do something other than hack YouTube viewers who watch “bad” videos, and if they do do that the problem isn’t Tor specific). The second problem (0 days in browsers) are what allow you to get your whole computer to be taken over, but these are super rare as browsers have multiple layers of security (including literally running code in a new virtual machine for each tab), you can get paid millions of dollars for finding one, they’re usually reserved for big targets like prominent journalists and not for mass surveillance (that would “spoil” the 0 day as trying to target everybody who knows about tiananmen square 1989 will lead to it being discovered faster). Again, regular browsers are affected by this too, and the only risk is dark web publishers might be more sketchy, but earning millions of dollars and potentially a job as a professional hacker with NSO group is probably more lucrative than hacking a few hundred people who visit their sites. TO BE EXTRA SAFE: it is good practice to set the security level in Tor settings to “safer” or “safest”. This disables lots of common attack vectors that have had security issues in the past (although “safest” disables JavaScript, preventing anything interactive from working, which is why I personally like “safer”). Some websites may break a little, but hidden services won’t as much because they know their target audience will use these modes. IMPORTANT: your coworker should follow proper Tor OPSEC when using it - that means no installing extensions, when logging in to an account on Tor assume you have as much privacy as using a norm browser, don’t use tor with another browser open (this isn’t to prevent hacking, just extra paranoia just in case, feel free to ignore this if it’s too annoying). I’d recommend this video series (watch part 2 also) to learn this.

Regarding screenshots and screen recording: if its not your coworker bringing stuff back from the West, they don’t have to do that in China - right click saving and downloading videos is safe. Just don’t download and run any untrusted executables.

Regarding bridges: there are mechanisms to prevent bridges from running out - the same IP returns the same bridges, each IP “range” (an ISP, a cloud hoster, etc) gets a pool of bridges (to prevent someone controlling all the IPs in a range to get all the bridges), there is a captcha (although its pretty bad and something you could break as a weekend project). You could get am obfs4 bridge and hope it works, but once it doesn’t (it’ll get found out eventually) you’ll need to get more somehow. Chinese online communities probably have better ways to get bridges - China has literally hired wumaos to solve Tor bridge captchas and eminent domained IPs from a bunch if Chinese ranges (temporarily) to block all the bridges one time.

Regarding getting it compromised: all bridges are obviously not in China, and Western nations would be more than happy to stop China from somehow seizing servers not physically in China. Lots of non-obfs4 bridges like meek are run by Tor themselves. If one is somehow compromised, it’ll be equivelant to a guard node compromise, meaning they’ll know your IP and when you use Tor, but nothing else (most bridges also don’t log, so the government has to start a covert bridge from scratch). Because of something called NAT (and even more so with CGNAT), your IP rotates to different people periodically, and CGNAT makes a bunch of people share the same IP. That means they have to ask your coworker’s ISP for logs to target them, which is very unlikely as that is a waste of resources. The current state of the art of “breaking Tor” that doesn’t rely on vulnerabilities is timing attacks, which requires lots of time, is too expensive to do on a large scale, and requires at least the guard/bridge and exit nodes to be compromised/monitored which is something only the NSA et al could plausibly do (as before, China doesn’t control the Internet access of a single Tor node, so the only way they do this is to buy a lot of servers in another country, a stunt some countries have tried before). In general, breaking Tor is so expensive that they’d only plausibly do it for high value targets like people they know are spreading dissent, and that usually only proves they visited a particular site (AFAIK, even this doesn’t work for onion services) or that they used Tor. Still, just in case your friend should auto update Tor or at least remember to update it frequently.

Sorry if this was too long. Hope your coworker will do well going back. Your coworker might be interested in this and his associated commentaries on Party ideology, if they haven’t seen it already.

Your friend needs to not fuck around right now. China is in the middle of an “anti-espionage” movement.

I would suggest “your friend” ask ppl who really lived through those events rather than web search. china is not as ironfist as the outside think. The most recent white paper thing is not as they reported in the west as I was there.

I was able to use tor with obfs4 to access outside websites like a year ago. The problem is captcha loop you will get in sites such as google. I heard snowflake works but have not try it.

Also, since sim cards and other internet access are registered with real name, it is not hard for them to find out who you are so don’t do weird stuff.

If this friend is taking data back, please be clever and use encryption. Could use a hallowed-out Chinese coin if big enough.
If I were in China, then I’d try either TAILS or Qubes with Whonix vm. Use a laptop purchased in cash and an antenna to connect to WiFi. Use https at all times and try requesting bridges or try snowflake.

I would like to strong patches medical issues

How cane he’s Sam medicine

As far as i know, tor works the same no matter where its accessed from, so as long as they can connect to tor, they should be able to acces any onion site thats online. If they need to hide the fact that they are using tor from the ISP, then they will want to use a tor bridge.

He would need to use bridges and should not connect to Tor from his home network, public wifi only.

China often does release malware filled versions of Tor to their citizens, verify every time!

Your totally real coworker could just connect to tor through a vpn. I think this solves everything? Let me know if I’m missing something.

(as an aside: I’d be very surprised if there was information about, say, Tianmen Square on onion sites that couldn’t be obtained on the regular web using a vpn connection… hell even the eye witness reports of the US diplomats that were cabled back to Washington can be easily found for anyone curious enough to look)

Nothing of what u said. They openly take people’s devices and check for vpn or tor or similar softwares, from public plzces like metros or malls or traffic stops even. Best bet is to keep an external ssd with trails on it.

Yes this is some of the information we’ve found, could nuclear_splines comment about using an unlisted and obfuscated bridge work around this?

shame lock smart strong cause drab axiomatic important edge friendly

This post was mass deleted and anonymized with Redact

Thanks this is very helpful. And along the lines of how he feels. But using a little extra paranoia can’t hurt.

I’ve shown him this post and he is looking at the videos. I think what surprises him the most is how easy it is to find this information here. He wants that access in China.

Some networks (including China’s great firewall) block access to public Tor entry guards or the Tor directory authorities or may block any connections starting with a Tor handshake. In this case you won’t be able to connect to Tor at all without using an unlisted and obfuscated bridge.

vpn absolutely doesn’t work. maybe custom wireguard but almost always no

Yes, an obfuscated bridge can technically hide your traffic. The issue with China is their level of insight/control over routing. Realistically speaking, any obfuscated bridge is gonna have a non-typical traffic signature as well as being a form of “watering hole”. Personally, I would say China requires some of the most extreme oppsec available, which would be Qubes + whonix + untraceable ISP (stealing your network connection/public internet).

That’s like saying “I know tons of drug dealers who never get caught, they dont care about drug dealers”.

Except they do, they just dont care right now. They will put you on a list, and the minute the police needs something to do or the State has some unknown need for leverage, bye-bye freedom.

Assuming he is able to access via an unlisted and obfuscated bridge, how likely is he to be traced? We really don’t understand how secure TOR is even using it in the US, we’re all new to it.