In September we focust mostly on making the Nothing to hide organization more robust and resilient. The Tor relays we added in July are still growing in terms of consensus weight.
The metrics used in this report are rounded extrapolated snapshots of the final day of the month, to not give away too much specific information.
We received 0 official LEA requests this month.
|Digital Forensics Corp||1|
Total traffic in September grew a tiny bit.
|Period||# Guard||# Exit||Bandwidth||Daily traffic||Monthly traffic|
|November 2022||18||0||5.6 Gb/s||60 TB||1.800 TB|
|December 2022||34||18||12.8 Gb/s||138 TB||4.150 TB|
|January 2023||68||18||18.5 Gb/s||200 TB||6.000 TB|
|February 2023||3||124||22.5 Gb/s||240 TB||7.200 TB|
|March 2023||6||172||27.0 Gb/s||290 TB||8.700 TB|
|April 2023||6||172||26.0 Gb/s||281 TB||8.400 TB|
|May 2023||6||172||26.0 Gb/s||281 TB||8.400 TB|
|June 2023||6||172||23.5 Gb/s||254 TB||7.600 TB|
|July 2023||6||288||28.5 Gb/s||308 TB||9.250 TB|
|August 2023||6||288||32.7 Gb/s||353 TB||10.600 TB|
|September 2023||6||288||33.6 Gb/s||362 TB||10.850 TB|
Note that for these statistics both incoming and outgoing traffic are combined (just like Tor network’s metrics).
3.000 per second
DNS requests on the Tor network are resolved by the Tor exit relays. This means that high capacity Tor exit relays can generate a lot of DNS queries. These queries are being resolved by multiple high capacity DNS resolvers.
In September the amount of queries-per-second increased slightly due to the slight increase in overall bandwidth.
|Period||Query rate||Daily queries||Monthly queries|
Do note that we don’t log the contents of DNS queries.
One of our major goals is to break the GNU/Linux monoculture currently present on the Tor network. Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. In a globally used anonymity network, monocultures can be disastrous.
We make the Tor network stronger and more resilient by running all our relays on FreeBSD. Here we report on our ongoing effort to increase operating system diversity on the Tor network. If any Tor operator reading this is interested in running Tor relays on BSD, please contact us and we will gladly help out.
|Period||NTH Guard||BSD Guard||GNU Guard||NTH Exit||BSD Exit||GNU Exit|
GNU/Linux is slowly but steadily increasing its share of the Tor network. This probably won’t change anytime soon sadly, a diverse and resilient network is a long .
It’s still quiet in terms of DDoS attacks. We would like to keep it this way.