Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 12 13 [14] 15 16 ... 208
196
Security / Re: Qubes Qubes Qubes
« on: August 31, 2013, 06:36 pm »
You're exactly right.   What everyone wants is Tails meets Qubes.

I would also love to see a Qubes Server Edition, basically Qubes without the GUI, and instead of choosing between KDE or Xfce, you could choose web and database servers which would be VM isolated. Add a TorVM and you have a highly secure, out of the box solution for hidden services.

Quote
USB-bootable Whonix (possibly with Tor running on host OS and not in separate VM) is probably the easiest thing to cobble together without very significant effort. 

Bazille has a tutorial that does pretty much that, except with a custom VM.

Quote

Supposedly, you can install Qubes on a thumb drive, so it can be a leave-no-trace-behind operating system, but I don't know anyone who has done it.
Wow.. I'm guessing whoever tried it is still waiting for it to finish booting. :)

LOL.

197
Security / Dissent: accountable anonymous group communication
« on: August 31, 2013, 06:25 pm »
Figured some people would be interested in this.

http://dedis.cs.yale.edu/2010/anon/

The Dissent project is a research collaboration between Yale University and UT Austin to create a powerful, practical anonymous group communication system offering strong, provable security guarantees with reasonable efficiency. Dissent's technical approach differs in two fundamental ways from the traditional relay-based approaches used by systems such as Tor:

Dissent builds on dining cryptographers and verifiable shuffle algorithms to offer provable anonymity guarantees, even in the face of traffic analysis attacks, of the kinds likely to be feasible for authoritarian governments and their state-controlled ISPs for example.

Dissent seeks to offer accountable anonymity, giving users strong guarantees of anonymity while also protecting online groups or forums from anonymous abuse such as spam, Sybil attacks, and sockpuppetry. Unlike other systems, Dissent can guarantee that each user of an online forum gets exactly one bandwidth share, one vote, or one pseudonym, which other users can block in the event of misbehavior.

Dissent offers an anonymous communication substrate intended primarily for applications built on a broadcast communication model: for example, bulletin boards, wikis, auctions, or voting. Users of an online group obtain cryptographic guarantees of sender and receiver anonymity, message integrity, disruption resistance, proportionality, and location hiding.

See our CCS '10, OSDI '12, and USENIX Security '13 papers describing the experimental protocols underlying Dissent. Also feel free to check out the source code at the link below, but please keep in mind that it is an experimental prototype that is not yet ready for widespread deployment by normal users.

198
Security / Re: Vpn help
« on: August 31, 2013, 06:15 pm »
I have never used a vpn and my question is can I use a router that was not provided by my internet provider?

You'll have to ask your ISP. How are we supposed to know its policies when we don't even know which ISP you use.

Quote
If so recommendations on brands or models?

Any router with DD-WRT and at least 32 MB of memory should be able to run a an OpenVPN client. The client can be installed as an add-on to DD-WRT. Some routers come with an OpenVPN client installed. You can search a site like Newegg to find them.


199
Security / Re: Tor usage doubles in under a week
« on: August 31, 2013, 06:09 pm »
Yep, well now it's more like 600, so we're getting there. :)

OTOH, I have noticed a slowdown of the network, and more of my connections have been failing, even to clearnet sites. Bandwidth hasn't increased (these million new clients don't seem to be doing much), but the network may be slower because the relays have to manage three times as many circuits, which requires CPU power to do the crypto operations, and that's always been a bottleneck.

If a million people just joined the network, some of them should run relays. I'd like to see 10,000 on the network.

200
Security / Re: Tor usage doubles in under a week
« on: August 31, 2013, 03:51 am »
If you know what fraction of the US population Chicago represents, then as a first approximation you can take that fraction of the national count of Tor users as  your estimate of Chicago Tor users.

I did that with my analysis of a potential attack on vendors. I think the number was 200 Tor users for every million citizens, something like that.

201
Security / Re: Tor usage doubles in under a week
« on: August 30, 2013, 07:42 am »
Sadly, whenever there's a huge spike in Tor traffic, nobody seems cheery about that.

I'm cheery about this one. The metrics data shows a small increase in lag, but nothing noticeable while browsing. Meanwhile, we have 1.4 million Tor users instead of 500,000. Our anonymity set just tripled.

202
I guess I never thought of it because I never use client software to grab/look-up keys -- instead i used a web browser under Tor.

My public key is on some key servers and I didn't upload it. The proof (to me) is that it is signed by a key that hasn't signed the key on my computer. So somebody was playing around with their PGP program, signed my key, and it uploaded it to a key server. That may have been the default action. So they leaked their IP address to the key server, along with their association to me and SR.

It's best for newbies not to fuck with key servers at all. Disable everything that has to do with them.


Quote
You may have a point, but I fail to see where it benefits keyserver operators to log requests. I think that this is more of a theoretical vulnerability, as opposed to a practical one.

Why? Key servers run on web servers and all web servers log IP addresses by default. If nothing else, the benefit is to detect malicious behavior, DDOS attacks and stuff like that. The side effect is being a target of subpoenas.


203
Security / Re: Obfsproxy
« on: August 30, 2013, 05:47 am »
Say if one were using public obfs2/obfs3 bridges, how well would would that really protect you from your ISP seeing your Tor usage?

The Chinese government already cracked obfs2. They can DPI it. They also enumerated all bridge IP addresses a couple of years ago. The Tor Project should be doing a better job of dividing the BridgeDB buckets and detecting mass enumeration attempts, but it's possible the NSA or other intelligence agencies could have enumerated them. OTOH, the churn might be high enough to supply a decent pool of IP addresses at any one time. So far there is no documented evidence that anyone can DPI obfs3.

The answer to your question is that nobody knows for sure, but using an obscure VPN provider in combination with obfs3 bridges is your best option for membership concealment in the Tor network.

204
Security / Re: Tor usage doubles in under a week
« on: August 30, 2013, 02:20 am »
https://metrics.torproject.org/users.html

That is interesting. I was perplexed by the fact that the number of relays increased from 3500 to almost 4500 in a few months:

https://metrics.torproject.org/network.html

but the number of users had stayed the same. I highly doubt this spike was caused by the DPR interview, which hasn't come out in print yet. The online version has received 380,000 views, some of them the same people who visited the page several times. Maybe 200,000 to 300,000 unique people have read that article, not enough to account for a 900,000 increase in Tor clients, even if we absurdly assumed that 100% of people reading the article decided to run Tor and buy drugs on SR (it's probably more like 1%).

For anyone interested, the thread is here: https://lists.torproject.org/pipermail/tor-talk/2013-August/thread.html#29582

The hypotheses range from Pirate Browser to Russian Tor censorship to botnets, but Pirate Browser seems to be the most popular explanation.



205
Security / Re: Obfsproxy
« on: August 29, 2013, 12:23 am »
Obfsproxy is a protocol that only bridges use, and only a subset of them, so there are no entry guards involved. By using obfsproxy, you are ostensibly already hiding your Tor use because you are using a bridge. Well, you are hiding it from IP address scanners, but the connection can still be DPIed, which is what obfsproxy is for.

You have to manually select obfs2 or obfs3 bridges from the BridgeDB (https://bridges.torproject.org) to use obfsproxy. You also need a special browser bundle:

https://www.torproject.org/docs/pluggable-transports.html.en#download


206
Security / Re: best DNS
« on: August 29, 2013, 12:15 am »
The best DNS servers to use are whatever random exit nodes use, via Tor's remote DNS resolver.

207
Security / Re: Theory: Blind markets
« on: August 28, 2013, 04:52 pm »
Astor actually brought up a good point and I am struggling to find a perfect solution. Although the content on EKS servers is encrypted, we should assume that the people running the servers will be able to obtain keys for certain content, we should also assume that some of them are malicious and could try to censor information. There are distributed PIR schemes that hide the content of the database from the servers, but a client that queries the database still does so by index position. That means if an entity that runs a PIR server also runs a client, and the client knows a certain message is at index 42, the PIR server can then link the secret share at position 42 to the message downloaded by the client. So even Goldbergs PIR will not work to solve this problem. The problem is characterized as follows:

Given a server or cluster of servers hosting a database, how can we have it so that:

A. Clients can request specific files from the database (via position or keyword)

B. The servers hosting the database cannot determine the clients query (ie: servers cannot tell the position requested or keyword searched for)

C. The servers hosting the database cannot tell the files returned (ie: they do not know what they send back to the client)

D. The servers hosting the database cannot tell the files hosted (ie: they cannot ever see any content that the client eventually obtains, during storage or transfer)

E. An entity that owns a client and a server cannot download a known file from the database in order to be able to associate content on the database with the file (ie: the server cannot link data it hosts to content even if it downloads the content partially from itself while acting as a client)

I think this problem is solved by querying multiple servers. Unless an adversary runs all or almost all nodes, you will be able to retrieve the content. Comparing the results of multiple queries from different nodes will allow clients to determine which ones are censoring, and even what kinds of content they are censoring, and the clients could blacklist those nodes.

In the end, censorship is simply impractical if the network of nodes is big enough.

208
Security / Re: tor project member was an FBI informer
« on: August 27, 2013, 08:38 pm »
Read this – http://pastebin.com/qWHDWCre
It shows a member of the TOR Project also run 12 Freedom Hosting TOR exit nodes and was a FBI Informant. This is why TOR was suddenly being pushed as “update available” 3 months back. TOR Project members were able to disable noscript and switch on JAVA without the average user noticing. When Freedom Hosting was taken down, the FBI already had full co-operation from TOR Browser Bundle project team. The Tor Browser Bundle was put together with Mr Perry from Tor Project Team as he also run Freedom Hosting.

http://i.imgur.com/seh6p.gif

209
Security / Re: Qubes Qubes Qubes
« on: August 27, 2013, 08:00 pm »
If an attacker has access to the thumb drive and finds a way to get your paraphrase or to break the encryption, it becomes available to see.

Tails with a persistent volume is vulnerable to the same attack, and that's how most people here use it. I think the plan is to flush it down the toilet so there's no trace of even a Tails system image on any storage media in their possession. Somebody said in a thread recently that their thumb drive is so small they can swallow it. :)

So Qubes on a thumb drive is not worse that Tails in that respect, but it's better because of VM isolation (although you have to setup a Tor VM, whereas on Tails you manually have to add bridges).

210
Security / Re: Qubes Qubes Qubes
« on: August 27, 2013, 07:18 pm »
Supposedly, you can install Qubes on a thumb drive, so it can be a leave-no-trace-behind operating system, but I don't know anyone who has done it.

Pages: 1 ... 12 13 [14] 15 16 ... 208