Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 [2] 3 4 ... 249
16
Philosophy, Economics and Justice / Re: Why I abandonded Libertarianism
« on: September 25, 2013, 08:49 am »
Hungry Ghost what is your fascination with groups of people in close geographic location being forced to behave in the same way? It is a really weird and primitive way to see the world. Why do we need some new land to be opened up for libertarians to all move to? Why can't we just let people be libertarians where they already are? What is the big difference? You guys can keep paying your taxes, and the people who want to experiment with libertarianism can stop, and only pay for the services that we desire. You guys can keep being arrested for drug crimes, and we can stop and be free to use drugs. There is no magic that happens when a critical mass of people is reached in a certain geographic area. We don't need our own island. We just need to start having libertarian rules and non-libertarian rules, and let people pick which one they want to be. If you would love to keep being bothered by the police and thrown into prison and extorted for money to fund the very people who oppress you, feel free! But we don't want to do that, so we shouldn't. There, now libertarians can be happy and statists can be happy, and we don't need Antartica to become habitable to satisfy your geographic proximity fetish.

17
Security / Re: What Is The Weakest Part of SR?
« on: September 25, 2013, 08:43 am »
I would say  that #4  (mail) is the ultimately weakest part of the SR network. We can envision a possible future in which the security of the tor network/bitcoin, the workability of bitcoin, the strength of the protective measures that DPR has in place against cyberattacks, and all other security nodes are relatively impervious, at least in the sense that the full brunt of world government doesn't come down to attack us.

As long as users use proper communication methods (e.g. PGP) that are easy to learn and adopt safe browsing practices (again easy to learn), the one flaw in the system that I cannot see us adequetly resolving is the issue of delivery of goods from vendor to buyer.

Yes it is true that the USPS sucks and the chances of mail being intercepted is rather low (so long as stealth shipping is in place, which all vendors should already know how to do), but I feel that we're at a dead end at the particular point in time.

I suppose an ideal solution would be to design some sort of "underground railroad" where drugs are shipped to each other using a private Silk Road courier (obviously you'd need a front for the business). The courier would only ship from vendor to buyer, the driver would be paid off or something, etc. Wild idea but in my opinion that'd be ideal to resolve the shipping/delivery problem.

If SR gets big enough it could break apart into local city wide groups, with dead drops. The only people that would need to travel far distances would be big suppliers, and they would be well compensated. Small orders could be dead dropped around the city.

18
Security / Re: Dissent: accountable anonymous group communication
« on: September 25, 2013, 04:34 am »
Why does a relay have to only relay tor traffic? Why cant you confuse them by relaying things other than tor, so whatever network map they build will be muddled by unrelated connections? If they can get an ip of a tor relay and assume every connection going to and from it is related to tor then yes its going to be easy as hell to map out the network, but why cant we hide among the clearnet too?

Also what about obfsproxy, isnt this supposed to mask the tor connection? like how skyemorph is designed to make a tor connection look identical to a skype video call which is all p2p anyways. im not seeing whats the difference between invariant traffic and traffic that is identical to whitelisted traffic.

http://freehaven.net/anonbib/cache/morphing09.pdf

Quote
    Recent work has shown that properties of network
traffic that remain observable after encryption, namely
packet sizes and timing, can reveal surprising informa-
tion about the traffic’s contents (e.g., the language of a
VoIP call [29], passwords in secure shell logins [20],
or even web browsing habits [21, 14]). While there are
some legitimate uses for encrypted traffic analysis, these
techniques also raise important questions about the pri-
vacy of encrypted communications. A common tactic for
mitigating such threats is to pad packets to uniform sizes
or to send packets at fixed timing intervals; however, this
approach is often inefficient. In this paper, we propose
a novel method for thwarting statistical traffic analysis
algorithms by optimally morphing one class of traffic to
look like another class. Through the use of convex op-
timization techniques, we show how to optimally modify
packets in real-time to reduce the accuracy of a variety
of traffic classifiers while incurring much less overhead
than padding. Our evaluation of this technique against
two published traffic classifiers for VoIP [29] and web
traffic [14] shows that morphing works well on a wide
range of network data—in some cases, simultaneously
providing better privacy and lower overhead than na ̈ve ı
defenses.                                                                             

19
Security / Re: Dissent: accountable anonymous group communication
« on: September 24, 2013, 09:32 pm »
Adding more nodes, including private bridges, is never the answer when it comes to protecting from an attacker that can see all links on the internet. Once you get to that you pretty much have five options to pick from. Constant rate cover traffic, DC-nets, Mixnets, PIR, Covert Channels.

20
Philosophy, Economics and Justice / Re: Why I abandonded Libertarianism
« on: September 24, 2013, 06:45 am »
If we just have the collective nuts to fire our guns when it mattered.

Look at the occupy movements.  If about 10,000 would have shown up armed and actually killed some of these CEO's then that would have made a difference.  We have been brainwashed into the idea that marching and carrying signs, or even showing up to vote will make a difference.  These billionaires and politicians use brute force when they feel threatened, so they need to be confronted with brute force.  You think if some fuck laid off a thousand employees then gave themselves a pay raise, then had themselves or family member killed, that they would repeat it again?  I think you would have people behaving more responsibly, or ready to die for money that they didn't need anyway.

Remember, our framer of our constitution, Thomas Jefferson said that we need a revolution ever 20 years to preserve our form of democracy, yet we haven't had another.

Those who are willing to sacrifice liberty for security deserve neither!

Why don't you move to North Korea if you like communism so much.

You apparently don't know the definitions of big words...you just hear them and what people say and think Communism bad, Capitalism good.  In reality, what I said had nothing to do with any of that.  Your response sounds like something Uncle Jimbo, from South Park would say.  I don't think I can get down to your level to debate.  I am sorry for you.

You want to kill CEO's because they make lots of money and lay workers off. Sounds like something a communist would say to me. You think the CEO is the slave of his workers. In reality the CEO doesn't owe the workers jack shit other than what they contractually agreed to. The owner of a company can shut the full thing down and fire every damn last person if he wants to, and if workers who lost jobs try to kill him because of it they should be thrown into prison and left to rot. You are the one who doesn't understand big words. What you said is communist as hell. You said that if someone fires people and gives himself a pay raise out of the money, that he should be killed. Sounds mighty close to from each according to his ability to each according to his need. The job provider has the ability to provide jobs, so you think he must provide them, and the workers need jobs so you think they should be given them, since the CEO doesn't need an extra million dollars.

21
Security / Re: Tor update warning: Tor might not protect you from NSA
« on: September 24, 2013, 06:35 am »
NSA doesn't need to own any nodes to attack Tor they already pwn the links of the internet.

22
Security / Re: Dissent: accountable anonymous group communication
« on: September 24, 2013, 06:25 am »
It is actually pretty easy for an attacker who watches all the links on the internet to find all of the Tor bridges, even if they are not published.

23
Philosophy, Economics and Justice / Re: Let's define Freedom
« on: September 24, 2013, 04:46 am »
Quote
giving and fulfilling the maximum need valid at all time

No idea what this means honestly.

24
Security / Re: Operating SR on the Clearnet
« on: September 24, 2013, 03:58 am »
In the USA linking to silk road is illegal under the Ryan Haight Online Pharmacy act

25
Security / Re: Operating SR on the Clearnet
« on: September 24, 2013, 02:47 am »
I'm not familiar with the site, but logically, the only reason a clearnet CP site should be able to operate openly is that it's hosted somewhere that's too much trouble to take down.  My prediction is that if you had a couple US news segments on it, and a few articles, and got people riled about it, it would be gone inside of a month.

Wikileaks is a decent example.. but they had a groundswell of public opinion behind them in many circles.  The US strongarmed lots of their hosting nations/providers, but got to a point where they couldn't exactly launch a Tomahawk cruise missile at OVH's French datacenter.  And I assume the French government or legal system told them to fuck off.  So it stayed up.

I guess it could be done if you found somewhere suitable, but relying solely on political cover for heavily-targeted money making activities is an insane gamble.   Google Viktor Bout for a great example.

The whole "bulletproof datacenter" concept only goes so far, IMHO.

As far as I can tell, Ranchi never stays at the same spot for long and is constantly moving the location of its server and gateway, and also uses new domain names at a rapid rate. It is hard to shut down because by the time you get to its current datacenter, or seize its current domain, it is going to be at another one half way around the world with another domain pointing to it. They might even use a fast flux Botnet. Another thing is I don't think Ranchi actually hosts CP they only let people post links to legal upload sites that they post CP on.

Although it is possible to host CP from clearnet servers without moving around all the time. Heihachi is a prime example of a hosting provider that has hosted botnet CNC and CP while telling the police of the world to fuck off. To appearances it seems they are able to do this because their datacenter is owned by the Russian mafia, and Russia is so corrupt that the mafia has substantial control of the government, and indeed the line between mafia and government is hard to tell in some cases. For example, the Russian cybercrime group RBN, another provider of bulletproof hosting, is thought to have done contract jobs for the Russian intelligence community.

Motherless is another site that gets away with hosting CP on the clearnet, even in the USA. They have taken a legal approach to security. Pretty much by only allowing user uploaded content, they have made it so they cannot get in trouble for the CP on their servers, so long as they remove CP when requested. The thing is, so many people post CP to motherless, and they are so slow to remove it, that it is essentially perpetually on motherless just like copyright violating material is perpetually on youtube despite efforts to remove it. By the time one offending bit of content is removed, the same thing has been uploaded a dozen other times. Also, they allow people to make uploads behind proxies, so the actual people posting illegal shit are secure because they are anonymous if they are smart, and the people running the server are secure because they technically comply with all laws while accepting CP with a wink and a nudge. Another thing working in their favor is that most of the illegal material depicts underage teenagers rather than true child porn, so the police probably have not made it a high priority, but they are kind of legally bound from doing anything against the operators of the site anyway. There are several other sites using a similar legal technique, but Motherless is probably the most blatantly accepting of CP of all of them. primeassteens is another such site, I see several people here have mentioned it actually, maybe not aware that it has more CP than you can shake a stick at on it. The sad thing is a lot of the people using sites like this don't even realize they are breaking the law because the sites are popular and on the clearnet, and it can be hard to tell legal teen porn from illegal teen porn in some cases. A lot of them probably have convinced themselves they are not breaking any laws, but the truth is all of these sites are bogged down with CP (although almost never anything below 12, and probably mostly 14+). Really nearly any porn site that allows user uploaded content is going to have CP on it, mostly teenagers, but different sites are quicker to take down offending material than others, and different sites have different policies in place to protect from being used by CP traders (ie: approval of all posted content before it is displayed would be an effective way to combat CP on such sites. So would banning images by their hash value instead of deleting offending uploads one at a time, even when they are duplicates of previously deleted images. But a lot of these sites know they are used for CP, and obviously are fine with it), and the groups who are particularly interested in this material are more likely to repeatedly post it to some sites than others (ie: they will post it to the sites that don't screen uploads prior to making the post viewable, and of those sites they will pick the ones that take the longest to take down offending material after it has been reported). Really there is no way to combat sites like this, the government cannot make a person responsible for the content other people have uploaded to their servers without making all sites that allow uploads vulnerable to being guilty of CP offenses, and the government has not even tried forcing sites to screen images uploaded before making them public. I think the law gives the owners 24 hours or something like that to take down CP after it is reported to them, but everybody knows taking it down is just a ceremonial dance, because it is going to be back ten minutes later (if it isn't already there at twenty other locations in the first place), and then it is back to 24 hours again after it is reported again. The police probably have better strategies than to waste their time doing that dance (and indeed they do, since the chatrooms and forums on these sites are totally filled with undercover cops posing as teenagers).

26
Philosophy, Economics and Justice / Re: Let's define Freedom
« on: September 24, 2013, 02:39 am »
Freedom is to be free until the point where someone else's freedom starts.

Now we need to figure out if 'someone else' includes only humans or also other species? Or maybe even plants and inanimate objects?

Definitions of words shouldn't include the word being defined in them.

Freedom is to have Freedom until the point where someone else's Freedom starts.

Infinite recursion, conveys no information what-so-ever.

27
In regards to my concern about Truecrypt using a 512 bit hash algorithm to gather entropy for keying a 256 bit symmetric algorithm, I have found out why it is not insecure for them to do this. The issue was that I had a misunderstanding of what it means for a hash algorithm to evenly distribute entropy of the input into the output.

My original fear was that since a hash function evenly distributes entropy of the input to the output, that feeding a 512 bit hash algorithm with 256 bits of entropy would produce an output of 512 bits each containing half a bit of entropy, meaning taking 256 bits of this output to key a 256 bit algorithm would result in the key having only 128 bits of entropy. This is not correct, and the problem was my understanding of the meaning of "evenly distribute entropy of the input into the output".

In reality, if you feed a 512 bit hashing algorithm 256 bits of entropy, each output bit will have 1 bit of entropy, up to 256 selected bits. This is not very intuitive to me, but it makes sense when you think of it as follows. Imagine there is an algorithm that takes a fair coin flip (producing a 1 or a 0 with equal probability) and outputs the input bit followed by the opposite of the input bit. Feeding this algorithm a 1 will then produce 10 and feeding it a 0 will produce 01. Now the entropy of the coin flip is 2^1 because the result can be either 0 or 1 with equal probability. The entropy of the second bit is also 2^1 then, because it can also be a 1 or a 0 with equal probability. So after feeding this algorithm 1 bit of entropy, the output contains two bits each with 1 bit of entropy, this is what is meant by evenly distributing the entropy of the input into the output. However, note that the output string itself also contains 1 bit of entropy, because it is either 10 or 01, so 2^1 possible states. So even though each individual bit of output has 2^1 entropy, the entire output string also has 2^1 entropy. This can hold true even if the algoritm repeats the pattern, feeding it a 1 produces then 10101010101010, and each individual bit in that pattern has one bit of entropy, but the entire string also has 1 bit of entropy because it is either 10101010101010 or 01010101010101, 2^1. So when you feed SHA512 256 bits of entropy, you can take the first 256 bits and they contain 256 bits of entropy, or you can take the second 256 bits and they contain 256 bits of entropy, even though the sum entropy of the 512 output bits contains 256 bits of entropy total. Any individual 256 bit selection from the 512 bits contains 256 bits of entropy, the even distribution of entropy doesn't mean that each of the 512 bits contains half a bit of entropy.

Just thought I would clear that up.

28
Security / Re: Dissent: accountable anonymous group communication
« on: September 24, 2013, 01:48 am »
Quote
Yes and I think mix mechanisms are important but mixing within a single nodes RAM does not seem enough. Ideally I want to be able to take a message out of the network, potentially deliver it to the next hop by another out of band network, possibly even by physical usb stick transfer, to another node and then back into the network and on to its destination. The ability to add completely arbitrary time delays and take the data off-network or indeed on-network at anytime potentially make traditional traffic analysis far less reliable.

Mixing inside RAM is enough. If an attacker notices a signal go into your machine, and you take this on a USB to another machine two countries away prior to forwarding it on, sure it could confuse the attacker. But if the attacker notices a signal go into your machine, and then a thousand other signals, and then they see 1001 signals leave your machine in a randomized order, they will be just as confused.

Quote
If Apple and Android would allow it, I would love to see a peer to peer PAN (bluetooth) app that basically acted as a variable-latency mixing relay in a loosely coupled mesh. Imagine - I would send a message from my phone it would at some point be passed on to somebody nearby running the App or possibly straight onto the Internet to a relay, zapped half way around the world to a client endpoint running the ap then back into a local PAN for a hop of two on a busy street in Jakarta, back into the Internet and over to some guy stood on a Metro platform in New York - over the tracks to a gal on the other platform then back into the net and so on....finally getting to it's destination n hops later.... it will come

Here is a paper you would probably be interested in, it discusses wireless meshnet anonymity systems:

http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA495688&Location=U2&doc=GetTRDoc.pdf

These systems are kind of esoteric. Not much research has been done on them that I am aware of. This paper discusses several of them, in addition to many other things. The networks in this category have names such as SDAR, AnonDSR, MASK, ARM, ODAR, AMUR, HANOR, ANODR, SDDR, ASR, ZAP, AODPR, AO2P, SAS, ASC and ASRPAKE. I know essentially nothing about any of these designs, other than that they are meant to use mobile wireless nodes. 

Quote
Yes I have heard of this but most of the material I have come across seems quite academic. I suppose one could adopt the concept of channels (effectively) and receive only a subset of the 'torrent' - but even with that I do not see how you can maintain the same level of recipient anonymity as the everyone gets everything model.

Well, if there are 5 PIR servers hosting a shared database for the PIR protocol from pynchon gate, a client can obtain data from them with information theoretic security unless all 5 of the nodes are owned by the same attacker. With everybody gets everything though they would have information theoretic security even if all of the nodes are owned by the same attacker. So in this instance the level of potential maximum anonymity is the same, but yeah everybody gets everything is superior because the absolute minimum anonymity is vastly different (nothing vs total anonymity).

Though in some, I admit rather contrived, examples it becomes less clear that everybody gets everything is superior. Imagine there is a standard centralized pynchon gate server cluster of 4 nodes. The clients using the system can download messages without the servers knowing the messages they downloaded, unless all of the servers are malicious. So 4 malicious servers is enough to break the security of this system. Now imagine an everybody gets everything network like BitMessage. Imagine only 6 nodes are part of the network. If 4 of the nodes are malicious, they can link messages from one client to another, since all messages are between the remaining two clients. In some instances they might even be able to tell which client sent which message (and from this deduce which client it was sent to), depending on the network topology. In this case both of the systems can fail with the same number of bad nodes. But this isn't really a fair comparison, since it isn't looking directly at the primitive used in the case of everybody gets everything, but rather looking at a way it could be used in a system that would weaken it. If anything this highlights the sometimes subtle difference between the types of security a system can have.

So in summary, I probably should not have said that there are systems equally secure to everybody gets everything. There are systems that can be as secure in practice, but theoretically they are still weaker, and this weakness could manifest in practice. And there are systems based on both primitives that can be equally insecure, but this is not really a fair analysis because it isn't looking directly at the primitive but at the way it could be integrated into a system. When I made that comment you quoted, the idea in my mind was the example I gave of 4 bad nodes being enough for a compromise in everybody gets everything PIR and Pynchon Gate PIR, as I explained above. But on giving it more thought, this isn't really a correct way to look at things, because it is looking at a system that could be built on everybody gets everything, rather than the primitive itself, which is more secure than the pynchon gate PIR, as it cannot be theoretically reduced from information theoretically secure, whereas Pynchon Gate PIR can be information theoretically secure but can also be theoretically and practically reduced from this level of security.

29
Security / Re: Tor update warning: Tor might not protect you from NSA
« on: September 24, 2013, 12:59 am »

I mean realistically, chances are most of the people reading this post are reading it more than an hour after I made it. If it took an hour for it to be published, you wouldn't be any the wiser. But I would have exponentially better anonymity.


We're not talking about a forum here. Obviously things like email, bbs, forums can wait. But if im selling something on a website and i have n number of items left and my customers are seeing the inventory i had an hour ago and suddenly i get a bunch of orders i cant fill? Ill have a bunch of pissed customers. Solve that one.

edit: what if i want to edit a forum post after i made it? I have to wait an hour for the changes to post? That could cause alot of confusion. Lets not forget what shakespeare taught us about the problems communication delays can cause.

Let's also not forget what the anonymity researchers taught us about the problems lack of communication delays can cause.

30
Philosophy, Economics and Justice / Re: Let's define Freedom
« on: September 23, 2013, 09:57 am »
all are individuals

Pages: 1 [2] 3 4 ... 249