Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 115 116 [117] 118 119 ... 208
1741
They can't stop it because anyone can fork bitcoin and create their own digital currency. We could use drugcoin!

What they can stop, or make exceedingly difficult, is exchanging state-backed currency to e-coins and vice versa.

It's hard enough for some people to get bitcoins. Litecoins introduce an extra step, because most people would have to convert BTC to LTC.

But let's admit what this is really about. You want to mine LTC and get free drugs. :)

1742
Silk Road discussion / Re: How fucked am I...
« on: April 04, 2013, 04:25 am »
Did you do anything illegal on that site?

Did you do anything that could link you to illegal activity (eg, mentioning Silk Road)?

If no, you'll be fine.

1743
Security / Re: How safe is TOR really ??
« on: April 04, 2013, 03:41 am »
The intro points shouldn't get DDOSed harder than the entry guards, because all of the traffic from 150 clients, going through more than 100 rendezvous points (presumably some clients use the same rend points) coalesces at the entry guards. So if the entry guards are ok, I think the intro points should be ok.

1744
Security / Re: How safe is TOR really ??
« on: April 04, 2013, 03:32 am »
Actually I think it is trivial for introduction points to know which hidden services they are intro points for, they just need to as clients connect to the hidden service and see if they are the introductory point selected. It is the correlation that I am worried about not MITM. It makes the hidden service less safe actually, because now not only can the correlation attack happen if the attacker owns the hidden services entry guard(s), but it can also happen if it owns the hidden services introductory points. And the introductory points of popular hidden services change rapidly because they become DDOSed.

Do you have evidence for this? Intro points are used temporarily to establish a connection, but the bulk of the bandwidth is distributed through the rendezvous points. That's one of the reasons to use rendezvous points.

So if you compare introductory points to exit nodes to clearnet sites, in this way they would be roughly equivalent in anonymity if we assume churn time is roughly the same (new introduction point selected once every ten minutes or so).

That seems far fetched. Take this forum as an example. There are 100-150 concurrent users, but how many are accessing the forum for the first time at any moment? Probably not more than one every 10 seconds.  6 new users per minute, 60 in 10 minutes. That seems like a fair estimate. I'm sure three intro points can handle 6 or even 20 users per minute. Even if the main site has 3 times the traffic, it doesn't seem like they would get DDOSed.

But with connection to clearnet site, if a thousand users access it there are a thousand different possible exit node selections, and if one exit node selected is bad it only effects the client that selected it, most clients will not be using that exit node. But with introductory nodes there are only a handful of them that ALL clients connecting to the hidden service with in the same ten minute period have to pick from. Now if one of the clients is using a bad introductory node they are likely sharing that bad node with hundreds of other clients all trying to connect to the hidden service.

I don't think that's going to be more than a few hundred people, even on the busiest hidden service.

1745
Silk Road discussion / Re: WARNING: TorMail phishing scam
« on: April 03, 2013, 10:13 pm »
TBH, the safest thing is to store all important links either as bookmarks or in a text file on an encrypted volume (where your TBB should be anyway). That way you can store strong passwords too. Don't call the file "my_drug_links.txt", because when you open it in a text editor, it can be added to recent documents/files, which could be incriminating.

1746
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 06:00 pm »
Of course, the attacker could fetch the descriptors of the popular hidden services and see if he connects to himself. In that case it would be provable.

I love discussions like this. They really get you thinking. :)

1747
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 05:55 pm »
The attacker cannot watch connections to the hidden service until they realize that they can trivially trace it to three entry guards with the brute force circuit construction attack, and then it is as anonymous as someone using *three* different non-stacked one hop proxies. Also attacker may only need to run the introduction nodes of the hidden service. For popular hidden services like SR the introduction nodes change rapidly because the clients DDOS them.

Maybe, maybe not. FH probably gets more traffic, and the Hidden Wiki might be up there. Certainly running a very active intro point would put it on a short list of hidden services that it is hosting the descriptor for, but it may not be provable which one. Also, what's the point? The intro point can't MITM the connection and serve fake descriptors, because they are signed with the hidden service's private key. The intro point *could* correlate traffic to users who are also using an entry node under the attacker's control. In that case, the hidden service is as (un)safe as a clearnet site, but not less safe. Lastly, if the churn is high, the attacker won't be an intro point for long, so the attack is limited and then users are safer than when using clearnet sites again.

1748
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 05:43 pm »
Thank you for the clarification. In the end of the day, How big is the risk for a TOR user to be identified? Assuming you are not giving personal info.

That's hard to quantify. What I can tell you is that Tor with TBB in its default configuration is the safest and most anonymous way to access clearnet sites, of all the options available on the Internet.

Accessing hidden services is safer than clearnet sites. Some argue that Freenet is safer than hidden services, but I have reservations about using Freenet and I2P because they are so small. It's easier to enumerate all IP addresses, and I'd rather not have my IP on some list, even if they can't prove what I'm doing. I'd rather mix in with the millions of Tor users and access hidden services instead.

Say you were to enter a site controlled by the attacker. Is that alone enough to reveal the true IP? Out of 1000 visits from TOR users, in how many cases would the attacker be able to reveal the true ip ?

From simply logging into the site? Assuming you don't provide identifying info, that alone won't deanonymize you. Again, there would have to be some specific attack, like the adversary tricking you into running malware, or selecting his relays for entry guards.

1749
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 05:27 pm »
How many TOR users in % do you think has been identified by LE?

Through a direct attack on the Tor network, like the one described here? None that we know of.

People have been identified because they took pictures with identifying landmarks in the background, or because they accidentally connected to a (IRC) server over clearnet. There are lots of ways to fuck up and deanonymize yourself, but nobody has been deanonymized because of an attack on Tor.

1750
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 05:23 pm »
Although you also need to take into consideration that the attacker probably just passively watches destinations of interest, so in practice they don't likely need to own your exit node, only your entry guard. If there are 900 entry guards and the attacker owns 100 of them, they own 1/9 entry guards. You select three entry guards every month to two months, and every time you do the chances the attacker owns one of them is 1/3.

True, true. Although you will only be accessing the destination web site 1/3 of the time through that one entry guard, if the purpose of the attack is to identity person X on the destination web site, you only need to go through the bad guard once.
Sounds like it is actually quite easy for LE to identify a TOR user? How many TOR users in % do you think has been identified by LE?

Well, that attack isn't trivial. It would be incredibly difficult to spin up 100 relays without getting noticed. If LEA are running relays, it's most likely fewer than 10. Also, watching certain sites, like Google and Facebook, would be really hard, because they use distributed content delivery networks. A user in Seattle accesses a different server than a user in New York when they go to the same site. It might be useful for specific smaller sites, but if the attacker runs 10 relays, then the chances of picking 1 of them as 1 of your 3 entry guards is 1/30, or only 3%. And if you don't pick any of them, the attacker would have to wait 1-2 months for you to new pick news, with again only a 3% chance of pwning you. It's not an effective attack for identifying a specific person. More like, "among all the users of this site, I can find a few of them every few months".

Also, none of this applies to hidden services, since the attacker can't watch the other end, although there are different potential attacks there.

1751
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 05:15 pm »
I get most of what you are saying, but some of it is very advanced. I try to keep up.

What is root privileges, and how would an attacker accomplish to get this? (Please explain, as simple as possible.)

Root privileges is the Linux version of administrator privileges, except it's the top administrator. The attacker would gain administrator privileges through a privilege escalation attack. TBB runs as the normal user, but an exploit could give the attacker higher privileges.

When I press "use a new identity" on vidalia, I change entry node, correct? How do I use entry guards instead?

No. You can specify entry nodes in the Tor configuration file, but that's for advanced users and you shouldn't mess with it. New Identity simply builds new circuits, but they go through the same entry guards. Entry guard selection is left for the Tor client.

You don't have to do anything to use entry guards. Your client uses them by default.

1752
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 05:09 pm »
Although you also need to take into consideration that the attacker probably just passively watches destinations of interest, so in practice they don't likely need to own your exit node, only your entry guard. If there are 900 entry guards and the attacker owns 100 of them, they own 1/9 entry guards. You select three entry guards every month to two months, and every time you do the chances the attacker owns one of them is 1/3.

True, true. Although you will only be accessing the destination web site 1/3 of the time through that one entry guard, if the purpose of the attack is to identity person X on the destination web site, you only need to go through the bad guard once.

1753
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 04:37 pm »
I should note that relay selection is weighted by bandwidth, so the attacker would have to control 1/10 of the entry and exit bandwidth, in the example above, not just 1/10 of the relays.

1754
Security / Re: How safe is TOR really ??
« on: April 03, 2013, 04:34 pm »
. The attacker hacks you and gets your IP address without breaking Tor
- I guess for this to happen the attacker would have to find and hack you outside of TOR, and therefor are not hacking you due to your SR activities, correct?

An attacker could hack you through a browser exploit. Even with transparent proxying of all connections, if he can get root privileges, he can disable Tor and your firewall. The best defense against this is an anonymizing middle box, a separate physical device from your main computer that runs Tor and transparently proxies all connections over the Tor network.

(What is zero days?)

Unpublished exploits.

B. The attacker is able to see your traffic enter Tor and arrive at its final destination
- What would it take for an attacker to accomplish this? And how would that work?

Run many malicious relays. The probability of sending your circuits through the attacker's nodes is roughly

Centry / Nentry * Cexit / Nexit

where

Centry = number of entry nodes run by attacker
Nentry = total number of entry nodes
Cexit = number of exit nodes run by attacker
Nexit = total number of exit nodes

Let's say the attacker spins up 100 entry nodes and 100 exit nodes. For the sake of simplicity, let's say no entry nodes are exits and vice versa. Currently there are about 900 total entry nodes and 900 exit nodes. Then the probability of getting pwned by the attacker is 100/1000 * 100/1000 = 1/100, or 1%.

That doesn't sound so bad, but consider that your Tor client builds new circuits every 10 minutes. If it chose from all entry and exit nodes, there would be a 50% probability of getting pwned after 8.3 hours of Tor use. That threat is mitigated by using entry guards. Instead of changing entry nodes every 10 minutes, your client changes them about every 2 months. So it takes 8600 times longer to accomplish this attack.

1755
Silk Road discussion / Re: Bitcoin just reached £95 (140$)
« on: April 03, 2013, 01:37 pm »
I'm bullish on bitcoin, but this has far exceeded my expectations.

At this point I wouldn't be surprised if we hit $1000 by the end of the year.

Pages: 1 ... 115 116 [117] 118 119 ... 208