286
Security / Re: HOWTO: Run a relay and help the Tor network
« on: August 17, 2013, 05:33 am »
Nice! Hopefully we can get lots of new relays on the network.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Also noise can be filtered even by me since they have watched two movies now. Maybe there are some other not SR people downloading the movie today as well, but how many of them downloaded movie 1 on the first day and move 2 on the second day? If I monitor the torrent swarms I can gather two crowds now and an intersection attack will reveal the people unique to both, who are almost certainly SR members. At this point I can wait to see if anybody comments on it and then if they are vendors I can try to correlate their shipping location with an IP address.
I just figured out Kgpg actually does run, but it hides/minimizes to the tray after start. Fucking KDE desktop. I think I'll add a "replace KDE with Xfce" step to the guide.
The tutorial has been updated. There is now a way to decrypt PGP messages with GPG4USB... See step 8.2. for more information about how to install GPG4USB.
Yes we know, but maybe include in tutorial during normal setup so it always be setup
Doesn't matter where the relays are if you are in US your traffic always enters through networks the NSA monitors.
This is the logic the Tor developers went with when they decided to leave javascript enabled. Oh , new users wont know to turn javascript on if they need it and so much of the internet needs javascript and there are other ways to be attacked anyway. So they left javascript on to cater to the noobs, and the noobs got fucked by it since the people who know to harden their browsers turned it off manually. There is a line between easy to use and secure, and when people head too far toward easy to use they get pwnt. We should not cater our tutorials to people who do not want to be secure. If they want to be less secure than we know how to be, they can still be more secure than the average user
QuoteSure you can. For #5, get people to run more relays (see the guide I just posted ). For #6, diversify the network outside of the cooperating intelligence agencies zone, which is my main suggestion in the relay guide.
Yes, adding more relays helps against #5. They ratchet the cost of Sybil attacks up. But to be clear, a hundred new relays doesn't change the risk all that much. A hundred thousand new relays does.
As an individual user, there's not much you can can do about today. And the risk stays relatively static, but the cost to exploit keeps going up. I think that last paper where they leveraged the bandwidth calculation on stacked Tor nodes was operating in the $500-1000 range for hosting, if I remember right.
Diversity helps #6, but I can't imagine the magic combination of routes you'd need to actually defeat it consistently. NSA should have visibility into any US links they want, and should be able to horsetrade or coerce for views of other links. If you could somehow balance the links between multiple spheres of influence (US, Russia, China, ?) you could make their jobs much harder. But again, as an everyday user of Tor and possibly hidden services, it's just a base level of risk that's present. You probably can't do enough personally change your risk. But it's a very small, very mild risk in the grand scheme of things.
Compared to the risk of mailing drugs around the world using the postal system, or trading CP, or leaking US military secrets, #5 & #6 are negligible levels of risk.
I'm arguing on the fact that you put the Whonix Gateway in a Windows Host in the insecure field just because of Windows but it is not necessarily so and it depends on the circumstances.
The Tor Browser Bundle has a 'Setup Relaying' option that seems pretty basic and quick to set up, is it not ideal or something?
What I'm saying is that I understand perfectly what you intend with your tutorial but you are asking a too big jump given the target.
We might include instructions to make obfs3 relay to help citizens in china and other countries and obfs relay better to conceal traffic.
apt-get install obfsproxy
BridgeRelay 1
ServerTransportPlugin obfs2,obfs3 exec /usr/bin/obfsproxy --managed