>Not a single intelligence agency or diplomatic service will rely on ToR for security that’s madness... For the most part any country which can perform intelligence collection out of its embassy will have sufficient budget and and technical capacity to develop their own secure means of phoning home.
The CIA has it's own onion service:
ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion
Tor was developed by the US naval research lab, it was opened up because an anonymity network only spooks use isn't anonymous.
Smart intelligence agencies are not going to reinvent the wheel (or in this case, the onion router).
>A properly configured commercial or open source VPN is considerably more reliable and secure than ToR since you have no idea who is listening on the exit nodes
If traffic is encrypted this does not matter. (HTTPS also provides integrity checking to show messages were not modified in transit)
Also, traffic to onion services does not exit the Tor network - there is no "exit node"
>Also for highly sensitive material a diplomatic pouch is still the most secure means of transport as it never leaves your sight and is never inspected and if you do get intercepted then destroying physical media is much easier than securing network traffic to the same level of assurance.
They may use diplomatic pouches for especially sensitive information, but the need for low latency communication is strong. What's more likely is that one time pad codes for said communications are sent via pouch, and the communication itself then goes over Tor or some other channel.
If I needed to design a secure system that didn't need to be anonymous I'd just have it send a HD full of random in a diplomatic pouch & ensure that the packets are sent with encrypted 0s if there isn't anything to say.
And that's only if you think that there isn't a safe pubic key protocol.
Bitcoin's security model relies on public key encryption & there is an extremely large bounty on breaking it. There doesn't seem to be evidence of it being broken yet.
I tried one of the older, shorter .onion addresses once out of interest. Didn't take long on a laptop to get a specified 7 characters at the beginning.
I don't know how much the longer .onions affects generation time - anyone?
The CIA has it's own onion service: ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion
Tor was developed by the US naval research lab, it was opened up because an anonymity network only spooks use isn't anonymous.
Smart intelligence agencies are not going to reinvent the wheel (or in this case, the onion router).
>A properly configured commercial or open source VPN is considerably more reliable and secure than ToR since you have no idea who is listening on the exit nodes
If traffic is encrypted this does not matter. (HTTPS also provides integrity checking to show messages were not modified in transit)
Also, traffic to onion services does not exit the Tor network - there is no "exit node"
>Also for highly sensitive material a diplomatic pouch is still the most secure means of transport as it never leaves your sight and is never inspected and if you do get intercepted then destroying physical media is much easier than securing network traffic to the same level of assurance.
They may use diplomatic pouches for especially sensitive information, but the need for low latency communication is strong. What's more likely is that one time pad codes for said communications are sent via pouch, and the communication itself then goes over Tor or some other channel.