856
Security / Re: Tails and TOR bridges
« on: July 02, 2013, 05:34 pm »
You can't for now. It's a TO DO item.
https://tails.boum.org/todo/persistence_preset_-_bridges/
https://tails.boum.org/todo/persistence_preset_-_bridges/
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Tor doesn't require root, but the transparent proxy stuff does (to the best of my knowledge). So basically the tor app runs exactly like it does on your PC, and your browser uses it exactly like on your PC too. By way of analogy, Tails would require root permissions because it fucks with the kernel NAT stuff. Er, that's ambiguous... not in a hacking way, in a "uses as designed," way.
Most exploits rely on root being installed, and especially package manager + root.
To prevent this build with seandroid MAC or use another permissions check like Open-Pdroid
http://forum.xda-developers.com/showthread.php?p=42368298#post42368298
The most important things :
- locked bootloader to prevent encryption key recovery
- no recovery mod or sabotaged one so they can't easily flash some forensics exploits
- disabling bluetooth, gps, google location service and NFC. disable wifi if not using it
- full encryption, then download 3rd party screen locker (or run your own) and uninstall it. now can use different pw for full disc and screen unlock instead of having to type in a gigantic unlock password
- not using a carrier install, installing anything else even Cyanogen mod (with su, pm and adb removed or chmod 000)
- not using the regular browser ever, only ORweb + Tor because Android is using old linux kernels full of known exploits
- turning off roaming to avoid Stingray fake FBI towers
- VPN or traffic through Tor to avoid carrier snooping and Stingray
You can also run that Nexus 4 rom in an Android Emulator and probably use it to make calls with Redphone + a Google voice number. I haven't tried it.
Tor I'm pretty sure is too slow/laggy for voice. I don't even think Jondonym mixmaster would work with RTP packets fast enough to not just hear echoing static.
I wouldn't root your phone either, if in the future it might be seized. You can bypass encryption, unlock screens and a whole bunch of evil with a rooted phone. Check out secdroid on XDA developers it's a pretty good replacement for standard carrier installs
It's probably better to use the regular Redphone app though and not your own server and private app to connect to it.
The TURN servers are just relaying encrypted RTP packets from one device to another, and the more you get lost in a bunch of other Redphone traffic the better so they can't prove you talked to somebody.
There is the danger of too much centralization over time with the bitcoin miners if the bar for mining gets too steep. Ideally every bitcoin client should double up as a lightweight miner or something. Realistically today if you are doing bitcoin mining and you don't have ASIC or better mining equipment then you're not in the game. One problem is that there is only three or four ASIC producers, which makes a bottleneck the government could control in theory. Having one dominant mining pool probably would be a bad idea as well, although I'm less clear on what effects that would practically have so long as they were profit oriented, higher transaction fees? In any case any centralization leads to the chances of a malicious actor like the FBI taking over becoming higher, that much is certain.
I know it seems like a minor tweak to the bitcoin concept, but nearly all technical innovations are evolutionary in this way, or to put it another way, everybody is a copycat if you look closely enough. Bitcoin itself is merely the composite of several different ideas thrown together. What is unique about its creation, is that SN saw the possibility of integrating them, not the ideas themselves, which are quite old. Bitcoin is a collage, not a creation.
Obviously you would never trust silent circle. The CEO is ex military, they will bend over for the first law enforcement that comes along and feed you a MITM attack session handshake that records your key for easy LE decrypting later.