Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.privacy    |    Discussing privacy, laws, tinfoil hats    |    112,125 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 110,712 of 112,125    |
|    D to Nomen Nescio    |
|    Re: Bitmessage - Escape the mixmaster pl    |
|    18 Sep 24 14:13:04    |
      [continued from previous message]              >and secure your Internet activity from Tor exit nodes because the       >connection between the exit node to the proxy is not encrypted, not       >one, but two parties may log and manipulate your clear traffic now. If       >you're using proxies in this way, you'll want to pay for them       >anonymously (cash in the mail [beware of your fingerprint and printer       >fingerprint], Liberty Reserve, well-laundered Bitcoin, etc) or use       >free proxies.       >One way to do that is proxychains. Another way would be to use a       >Transparent Proxy and then either proxify (set proxy settings) or       >socksify (use helper applications to force your application to use a       >proxy) the programs you want to chain inside your Transparent Proxy       >client machine.       >You -> X -> Tor -> X       >No research whether this is technically possible. Remember that this       >is likely a very poor plan because [#You-Tor-X you -> Tor -> X] is       >already a really poor plan.       >You -> your own (local) VPN server -> Tor       >This is different from above. You do not have to pay a VPN provider       >here as you host your own local VPN server. This won't protect you       >from your ISP of seeing you connect to Tor and this also won't       >protect you from spying Tor exit servers.       >This is done to enforce, that all your traffic routes through Tor       >without any leaks. Further read: TorVPN. If you want this, it may       >unnecessary to use VPN, a simple Tor-Gateway may be easier, for       >example Whonix.       >VPN/SSH Fingerprinting       >Using a VPN or SSH does not provide strong guarantees of hiding your       >the fact you are using Tor from your ISP. VPN's and SSH's are       >vulnerable to an attack called Website traffic fingerprinting ^1^. Very       >briefly, it's a passive eavesdropping attack, although the adversary       >only watches encrypted traffic from the VPN or SSH, the adversary can       >still guess what website is being visited, because all websites have       >specific traffic patterns. The content of the transmission is still       >hidden, but to which website one connects to isn't secret anymore.       >There are multiple research papers on that topic. ^2^ Once the premise       >is accepted, that VPN's and SSH's can leak which website one is       >visiting with a high accuracy, it's not difficult to imagine, that       >also encrypted Tor traffic hidden by a VPN's or SSH's could be       >classified. There are no research papers on that topic.       >What about Proxy Fingerprinting? It has been said above already, that       >connections to proxies are not encrypted, therefore this attack isn't       >even required against proxies, since proxies can not hide the fact,       >you're using Tor anyway.       >,, ^1^ See Tor Browser Design for a general definition and       >introduction into Website traffic fingerprinting.       >^2^ See slides for Touching from a Distance: Website Fingerprinting       >Attacks and Defenses. There is also a research paper from those       >authors. Unfortunately, it's not free. However, you can find free ones       >using search engines. Good search terms include "Website Fingerprinting       >VPN". You'll find multiple research papers on that topic.       [end quote; see also: https://www.danner-net.de/omom/tutorwme.htm]              Tor Browser 13.5.4 (2024-9-17):       https://blog.torproject.org/new-release-tor-browser-1354/       >New Release: Tor Browser 13.5.4       >by morgan | September 17, 2024       >Tor Browser 13.5.4 is now available from the Tor Browser download page       >https://www.torproject.org/download/       >and also from our distribution directory.       >https://www.torproject.org/dist/torbrowser/13.5.4/       >This version includes important security updates to Firefox.       >Send us your feedback       >If you find a bug or have a suggestion for how we could improve this       >release, please let us know.       >Full changelog       >The full changelog since Tor Browser 13.5.3 is:       >*All Platforms       > Updated NoScript to 11.4.37       > Updated OpenSSL to 3.0.15       >*Windows + macOS + Linux       > Bug tor-browser#41835: Review default search engine options       >*Android       > Bug tor-browser#43124: Implement a migration procedure for Android       > Bug tor-browser#43145: Backport Android security fix from 130.0.1       >*Build System       > All Platforms       > Bug tor-browser-build#41229: Migrate OpenSSL download location to       > github releases       > macOS       > Bug tor-browser-build#41231: Use var/browser_release_date in tools/       > signing/gatekeeper-bundling.sh       [end quote]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca