Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 71 72 [73] 74 75 ... 208
1081
Off topic / Re: Anonymous age poll
« on: June 11, 2013, 06:19 am »
imghost, nobody can see the results until they vote, so only the second person who voted knows how old you are.

After that you have plausible deniability.

1082
Newbie discussion / Re: What age girls do you think are sexiest?
« on: June 11, 2013, 06:08 am »
Damn scout. I was making fun of how specific the poll is.

1083
Newbie discussion / Re: What age girls do you think are sexiest?
« on: June 11, 2013, 06:00 am »
That's a very specific list. I personally like 27 year olds. 26 is too you and 28 is too old. I just re-marry every year.

1084
Security / Re: Zerocoins
« on: June 11, 2013, 05:21 am »
Apologies for pulling this old thread out of the grave, but rather than start a new one, I figured I'd tack some news onto the best one related to Zerocoin.

I just checked their web site and it says that prototype software should be available in mid-to-late June: http://zerocoin.org/software

Pretty excited! I want to play with it.

Hopefully it will be in production use on the bitcoin network by the end of the year.

1085
Once against demonstrating that a PGP key is more about identity than privacy in anon communities.

If a vendor "loses" his key, most people become suspicious that he's compromised. Make three backups of your key!

1086
Security / Re: Sites to AVOID while using TOR
« on: June 11, 2013, 12:46 am »
I had the impression from the various traffic analysis/traffic confirmation discussions (which I freely admit I only understand a portion of) that my ISP would have an easier time tracking my movements using TOR if I was simultaneously logged onto clearnet sites at the same time. On reflection, I don't know how this would work, and I'd be pleased to be corrected on this point.

Nah, the attacker would have to be watching the other end of your Tor circuit, either at the exit node, or at specific points between you and a hidden service, namely the hidden service directories, intro points, or the hidden service's entry guards. If an attacker is merely a local observer of all your home connections, that tells him nothing about what you are doing on the other end of a Tor circuit.

Quote
The Snowden affair has me wondering all the more about being flagged just for TOR use alone. We need to get on to a system whereby most people use onion routing and encryption making any individual user that much less worthy of further investigation.

Well, there are about 3 million people worldwide who use Tor every month for dozens of reasons, and about 250,000 in the United States, so flagging all of them would be pretty useless, which is why I don't think anyone is going on fishing expeditions against Tor users.

1087
Security / Re: 2013: the year NSA takes over
« on: June 10, 2013, 10:04 pm »
As various analysts have pointed out, too much data is as useless as too little data. If they are planning to intercept every byte (which I haven't heard, but let's say it's true), they will most likely have to filter 99% to find the signal in the porn.

1088
Security / Re: Brainstorming the ideal anonymity network
« on: June 10, 2013, 07:03 pm »
The crypto in Tor makes it CPU-bound. From the discussions I've seen, top of the line relays max out around 300-400 Mbit. That is why the Torservers are carrying around 30 MB (240 Mbit). 1. Because their theoretical maximum is so low. 2. Because few relays carry their theoretical maximum, even the exit nodes. I believe herngaard was pushing 50 MB at one time, which is 400 Mbit, and that's the most I've ever seen. So having a 1 gigabit port doesn't mean much. In order to push 1 GB, you will need 30+ servers.


1089
Security / Re: Brainstorming the ideal anonymity network
« on: June 10, 2013, 06:12 pm »
Also 1 gigabyte per second really isn't that much bandwidth. A quick search of hosting providers shows 1 gigabit per second unmetered packages averaging around $700 a month. I believe there are 8 gigabits in a gigabyte, so that means $5,600 a month to have enough bandwidth to fuck hidden services and their clients. It would take 60 days for all clients (and hidden services) to rotate entry guards enough to probabilistically select one of the bad entry nodes. That puts the price for massively breaking Tor anonymity at about $11,200 dollars. It would take about $11,200 and 60 days to deanonymize any hidden service and the majority of the clients connecting to the hidden service. I could afford to carry that attack out. I don't want to use a network that I can defeat with traffic analysis.

It's not that simple. Buying 8 servers with 1 gigabit ports doesn't mean all 1 gigabit will be used. In fact, from discussions I've seen, that's guaranteed not to be the case.

But my objection has more to do with the fact that adding 50% bandwidth to the network in a week, or even a month, would be noticeable. An attacker would have to spread it out over several months, greatly increasing the cost of the attack.

And you have to factor in the 12-18 servers needed for HSDirs, and the computational cost of brute forcing their fingerprints to be closest to the descriptor ID.

1090
Security / Re: Brainstorming the ideal anonymity network
« on: June 10, 2013, 06:07 pm »
So you want to run a client that speaks the Tor protocol and creates a hidden service, but the service is to be a relay? That is a very interesting idea, and something that, at least superficially (I'll have to give it more thought), I wouldn't be afraid to use.

If you build a separate network, then someone has to run the first node. That's a problem for us, since we have a preexisting need for anonymity, being associated with this community. But if the new network layers features onto the Tor network, it will be easier to get people to use it, and if it includes something like a messaging system, which a lot of people want right now given the Tormail problems, they will have an incentive to use it.

And it's interesting that hidden relays could provide plausible deniability to hidden services in the event of known attacks.

1091
Security / Re: Brainstorming the ideal anonymity network
« on: June 10, 2013, 04:58 pm »
Well actually, once they have the IP addresses, then they could order from the big vendors and find the city. The IP addresses that they enumerate in any city would be a short list.

Vendors definitely need to use bridges, permanent entry guards or VPNs.

1092
Security / Re: Brainstorming the ideal anonymity network
« on: June 10, 2013, 04:47 pm »
Just look at the recent HSDIR attack. An attacker is capable of being all HSDIR servers for a hidden service. That means they have the ability to constantly be positioned for 1/2 of a timing attack against any hidden service, and the clients accessing any hidden service. If they own 33.3333% of the bandwidth of the (I think?) 900 or so entry guards, they can deanonymize close to 100% of people who access the targeted hidden service within 60 days. That is the level of an attacker that can deanonymize almost all users of a targeted hidden service: if they can do the HSDIR attack and if they contribute 33.3333% of the entry guard bandwidth for 60 days. Even if they contribute less bandwidth and wait for 30 days, they are still going to be able to do some serious damage. Even if they own only a fraction of the entry guard bandwidth, they will be able to do serious damage over many months.

I think you overestimate how easy and effective that is. The total entry guard bandwidth in the network is 1200 + 800 = 2000 MB/s [1]. You  need to add 50% bandwidth to the existing network to become 33% of the final bandwidth, so that's 1 GB/s. Assuming the attacker adds very high bandwidth, 30 MB/s relays, he would have to add over 30 relays. If 30+ relays at 30 MB/s suddenly showed up on the network, people would notice.

Then the attacker would have run to these relays for at least month, and what would he get? A list of people accessing SR. A list of tens of thousands of people. What could he do with it? Accessing the market doesn't prove you did anything illegal. It doesn't tell you who the vendors are. It would still be incredibly costly to perform traditional police work to identify the high value targets.

Once again, the large crowd protects you.


1. https://metrics.torproject.org/bwhist-flags.png

1093
Security / Re: Sites to AVOID while using TOR
« on: June 10, 2013, 01:23 am »
If you pay for your internet access, what difference does running a computer over clearnet make?

Your ISP knows someone is running Tor connections out of your home either way, or at least they can know if they bother to look.

You might still have some plausible deniability in that you could be allowing a friend to access Tor from your home, or someone is stealing your wifi. Are you saying it's less deniable if the two forms of connection happen simultaneously? I doubt any of this matters in a court of law, since it could happen at the same time or different times.

In any case, so what? Using Tor doesn't prove you're doing anything illegal.

And accessing clearnet on a separate physical computer won't reveal your identity to the sites you are visiting over Tor. That's why I was said it was zero risk.

1094
Security / Re: Sites to AVOID while using TOR
« on: June 10, 2013, 12:32 am »
On separate physical computers? It is basically zero risk.

1095
Security / Re: Sites to AVOID while using TOR
« on: June 09, 2013, 11:48 pm »
Everyone in this community has it bass ackwards. Tor was designed for browsing clearnet anonymously. Hidden services are the experimental feature, with much less research and zero development effort.

Plus, a hidden service can attack you in all the ways that a clearnet site can. Hidden services can supply JavaScript, and Flash, and Java. They're just web sites serving code, exactly the same as clearnet sites. The only thing hidden services provide is anonymity to the server, not the client.

Pages: 1 ... 71 72 [73] 74 75 ... 208