Author Topic: Waxworms  (Read 291 times)

Vesp

  • Administrator
  • Foundress Queen
  • *****
  • Posts: 3,130
Re: Waxworms
« Reply #20 on: January 05, 2010, 03:24:15 AM »
It would probably be wise to take down the links.. I know I can see where most of my views for this site come from - the actual websites, etc -- so i am sure they can see it or something similiar as well..

Think we need to get a "shell" around this site, making it vieable by password only? I am not sure how to go about this.. but we/I could try to do it.
Bitcoin address: 1FVrHdXJBr6Z9uhtiQKy4g7c7yHtGKjyLy

shroomedalice

  • Guest
Re: Waxworms
« Reply #21 on: January 05, 2010, 12:49:58 PM »
will tor be bocked if not then no probs if so well I would say all the proxies will to and the only solution is to run your own proxy in
another country fuck man thats hard.

Sedit

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 2,099
Re: Waxworms
« Reply #22 on: January 05, 2010, 04:37:41 PM »
Odds are proxies wont help anyone there. You figure what thats doing is rerouting your information thru another server before it gets to you making a trace impossible because it appears as though the routing server is the calling IP. In this case it appears that all net information in and out of austraila will be funneled thru a set of servers meaning that the data itself is being filted not so much the place its comming from.

It depends because them may just use a block list instead of a keyword recognition... or build a database using both. If thats the case then the entire site itself such as the vespiary will need to be feed thru the incomming outgoing IP and that would make a proxie alot more reasonable. If they are filtering directly from keywords yall can kiss all the fun part of you internet goodby. Looks like its back to the adult bookstore because no more free porn for yall.
There once were some bees and you took all there stuff!
You pissed off the wasp now enough is enough!!!

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Waxworms
« Reply #23 on: January 05, 2010, 07:32:06 PM »
Even keyword filtering can be defeated by accessing the internet using wi fi and using TOR in conjunction with an anonymizing proxy service such as those at:

http://www.privax.us/

 8)
Chemistry is our Covalent Bond

Naf1

  • Foundress Queen
  • *****
  • Posts: 753
Re: Waxworms
« Reply #24 on: January 05, 2010, 08:59:40 PM »
Lugh is correct;

Circumvention

There are a number of resources that allow users to bypass the technical aspects of Internet censorship. Each solution has differing ease of use, speed, and security from other options. Most, however, rely on gaining access to an internet connection that is not subject to filtering, often overseas or in a neighbouring state not subject to the same censorship laws. This is an inherent problem in internet censorship in that so long as there is one publicly accessible system in the world without censorship, it will still be possible to have an access censored material.

Proxy websites

Proxy websites are often the simplest and fastest way to access banned websites in censored nations. Such websites work by being themselves un-banned but capable of displaying banned material within them. This is usually accomplished by entering a URL address which the proxy website will fetch and display. They recommend using the https protocol since it is encrypted and harder to block.

Java Anon Proxy

Java Anon Proxy is primarily a strong, free and open source anonymizer software available for all operating systems. As of 2004, it also includes a blocking resistance functionality that allows users to circumvent the blocking of the underlying anonymity service AN.ON by accessing it via other users of the software (forwarding client).[citation needed]
The addresses of JAP users that provide a forwarding server can be retrieved by getting contact to AN.ON's InfoService network, either automatically or, if this network is blocked, too, by writing an e-mail to one of these InfoServices. The JAP software automatically decrypts the answer after the user completes a CAPTCHA. The developers are currently[citation needed] planning to integrate additional and even stronger blocking resistance functions.

Virtual Private Networks (VPNs)
Using Virtual Private Networks, a user who experiences internet censorship can create a secure connection to a more permissive country, and browse the internet as if they were situated in that country. Some services are offered for a monthly fee, others are ad-supported.

Psiphon
Psiphon software allows users in nations with censored Internet such as China to access banned websites like Wikipedia. The service requires that the software be installed on a computer with uncensored access to the Internet so that the computer can act as a proxy for users in censored environments.[6]

TorToo slow for me!
Tor is a free software implementation that allows users to bypass Internet censorship while granting strong anonymity; see Tor (anonymity network)#Weaknesses for its weaknesses.

Sneakernets
Sneakernet is a term used to describe the transfer of electronic information, especially computer files, by physically carrying data on storage media from one place to another. A sneakernet can move data regardless of network restrictions simply by not using the network at all.[7]
The volunteer organization Information Without Borders is attempting to implement a sneakernet routing protocol for providing cheap Internet access to developing and post-conflict regions using donated flash drives, PDAs and mobile phones. The protocol is also useful for providing free and open Internet access to people living under repressive regimes that restrict free expression by limiting access.[8] This protocol is still under development, but actual flash-drive sneakernets are known to exist in Cuba. Flash-drive sneakernets were used in 2008 to distribute a video of a student asking why Cubans are not permitted to access web sites like Yahoo.[9]

timecube

  • Subordinate Wasp
  • ***
  • Posts: 230
Re: Waxworms
« Reply #25 on: January 06, 2010, 12:21:18 AM »
The way I understand it, they didn't have any real implementation of keyword filtering planned.  What the Australian government originally did was compile a list of what they considered to be bad sites (yes, they actually thought they could compile every "bad" site on the internet into one big list) and sent it to a number of ISPs on a trial basis.  Before they could go large scale with it, someone leaked the list (it's on Wikileaks, but they seem to be having funding issues at the moment.  I don't know if their interface through Tor is still up and running.)

The list was full of problems.  Lots of the sites listed had nothing to do with what the government claimed.  Many were innocent business and personal websites.  Some used to be something the government didn't like but had been since re-registered.  Many of the links were very specific, down to individual pages on websites that were to be blocked.  It seriously looked like a plan some small town high school would try to implement to keep kids from looking at porn sites, adding sites as they became aware of them.

It was clear that whoever was putting together the entire plan had no clue how the Internet works.

I haven't looked into it in a while, and it may have changed completely since then, but the original implementation I saw was a fucking joke.

It's possible to block Tor, but it requires constant scanning of available Tor servers and banning access to the IPs.  I believe that's outside of their competency, but even if they managed it, private Tor clusters would likely emerge to avoid tracking.

Prepuce1

  • Pupae
  • **
  • Posts: 96
Re: Waxworms
« Reply #26 on: January 07, 2010, 05:28:13 AM »
You can absolutely get around the problem of filtering URLs using Tor. This was one of the main reasons the software was written. I've been using it for about a year. I don't have the problem you're talking about, but often set up the software so that I can be one of the relay servers. I didn't know that Australia was planning such a thing, but TOR has been working for the Chinese. Because it's an encrypted connection they won't be able to key on certain words or phrases, and you'll connect to a different URL every time. It's not 100% effective, but I think it's one of the best solutions available.

Tor now runs under a controlling package called Vidalia. You can get the free software and read more  here:
   https://www.torproject.org/vidalia/

An alternative might be JAP, run primarily in Germany but with servers in other places. The only troulbe is that it is very slow if you use as free connection. You get better speed if you pay. If that interests you, check their website:
   http://anon.inf.tu-dresden.de/index_en.html
I'm not sure their service will accomplish the goal, so reading up would be in order.

There are other possible solutions that can be found by googling around a bit.

PP

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Waxworms
« Reply #27 on: January 07, 2010, 01:43:10 PM »
JAP was the first anonymizing service that could defeat traffic analysis, but when their funding was cut their service became much less useful  :'(  They did demonstrate that such technology could work quite effectively so their primary goal was accomplished  :) TOR can't encrypt the connection between one's computer and the TOR service, that must be protected by SSL or by means of another proxy service such as those at Privax which will hide that data from keyword filtering even without SSL  ;)  It's rather doubtful that Conroy and Benson's firewall will even work very well, but members that will be affected need to understand the technology well enough to evade it if they wish to continue to be able to access sites that are deemed inappropriate  8)
Chemistry is our Covalent Bond

Prepuce1

  • Pupae
  • **
  • Posts: 96
Re: Waxworms
« Reply #28 on: January 08, 2010, 03:43:15 AM »
Lugh, while challenging something you've said is like challenging Geezmeister, in that I usually discover later that it was me that was wrong. Even so I have to say that I believe you've misunderstood Tor's methodology.

A true firewall isn't going to help much at all by itself. An anonymous proxy server with an encrypted connection will work but you have to trust the person running it. Another concern is that SSL has been broken, so it's not so secure any more. Tor doesn't need to encrypt the data (although it employs SOCKS) for the reasons partially explained below.

Here's just a little bit from their website: https://www.torproject.org/overview.html.en   There are illustrations on the website that makes a lot of the following easier to understand. There are also several scholarly discussions on the capabilities and limitations of Tor and the accompanying software. I would encourage anyone who has a problem of the type we're discussing to look for themselves at the available information.

"A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.

"But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

"The solution: a distributed, anonymous network

"Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.

"To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through. "

PP

Prepuce1

  • Pupae
  • **
  • Posts: 96
Re: Waxworms
« Reply #29 on: January 08, 2010, 05:27:59 AM »
I didn't expect to have to do it even before Lugh replied, but I already see that I was mistaken about his statement on the firewall. I had not seen it referred to as Conroy and Benson's firewall, but that is indeed what they are calling the internet filtering the Australian government wants to impose on ISPs.

Critics of the plan insist that anyone who wants to defeat it will be able to do so, and there's plenty of information that will tell you how. It's hard to imagine that they would be able to block all of this kind of thing.

During the cold war the U.S. made a big deal out of the repressiveness of the communist countries. Little did I realize at the time that the so called democratic countries are far more repressive, and the talk about the communists was mostly propaganda. The UK is now so monitored and restricted that it must be difficult to do anything and be sure someone isn't electronically watching you. Now Australia.

The U.S. government went heavily into the business of spying on our own people with the passing of the ironically named Patriot Act, and the formation of the dept. of homeland security. All countries need to watch their backs these days, but what's been made public about these programs in the U.S. accomplishes little in that regard, and seems more like an excuse to put in place a system to make it easier to monitor communications among citizens.

PP

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Waxworms
« Reply #30 on: January 08, 2010, 10:34:22 PM »
TOR doesn't change the headers, but services such as Hide My Ass do  ;) Thus one can defeat keyword filtering, by using the two proxy services at the same time  ;D  Connecting to the internet via wi fi uisng TOR and Hide My Ass will defeat a keyword firewall in my humble opinion since it's worked when TOR alone wouldn't  8)
Chemistry is our Covalent Bond

shroomedalice

  • Guest
Re: Waxworms
« Reply #31 on: January 09, 2010, 12:41:44 AM »
I dont think it will be that easy.

all the universities now use a system called web washer and I have a funny feeling that will
be the bassis of the filter.

no proxies full stop tried many times only way I could get it to work is if I wrote my own cgi proxy.

Prepuce1

  • Pupae
  • **
  • Posts: 96
Re: Waxworms
« Reply #32 on: January 09, 2010, 05:32:36 AM »
TOR doesn't change the headers, but services such as Hide My Ass do  ;) Thus one can defeat keyword filtering, by using the two proxy services at the same time  ;D  Connecting to the internet via wi fi uisng TOR and Hide My Ass will defeat a keyword firewall in my humble opinion since it's worked when TOR alone wouldn't  8)


Lugh, were you aware that Tor now comes bundled with a proxy server now? It's one that runs on the local machine but prevents headers, cookies, etc., from going out.

For those who want to aid the Tor project there are two options. The first is to relay traffic for the Tor network. The second is help censored users reach the internet. Of course you can do both. The help file describes it this way:

" Decide whether you want to run a normal Tor relay or a bridge relay (Tor 0.2.0.8-alpha or newer). Bridge relays help censored Tor users who are blocked from accessing the Tor network directly. Check the box labeled Relay traffic for the Tor network if you want to run a normal Tor relay or Help censored users reach the Tor network if you want to run a bridge relay. "

Shroomed, have you tried Tor with web washer? If you use the latest software bundle (which includes Vidalia, Polipo and Tor),  I believe it will get around it.

PP

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Waxworms
« Reply #33 on: January 09, 2010, 04:06:14 PM »
It seems you need to use wi fi to connect to a router that has Net Nanny or some other keyword firewall that blocks porn installed on it using TOR to access a site like WD Restored and see what happens with your very own eyes  ::) 
Chemistry is our Covalent Bond

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Waxworms
« Reply #34 on: January 10, 2010, 07:50:37 PM »
From

http://www.privax.us/about/

Privax sets out to achieve giving people the chance to surf anonymously online. Privax currently consists of The Privax Network which is a small but growing network of web proxy sites. Web proxies give people the ability to surf anonymously online with ease, by visiting one of our networked sites, anyone in the world can surf under our IP address in America. This brings many advantages, e.g. in China the government restrict people access to a lot of web sites (The Great Firewall Of China), but by using one of our sites, people from China can bypass the firewall and appear from the USA. Another example is when a typical college student wants to access a site which is blocked by the college filter system (e.g. MySpace!), we offer these students the ability and freedom to access blocked sites.

 8)
Chemistry is our Covalent Bond

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Waxworms
« Reply #35 on: January 10, 2010, 11:02:40 PM »
From

http://www.privax.us/about/

Privax sets out to achieve giving people the chance to surf anonymously online. Privax currently consists of The Privax Network which is a small but growing network of web proxy sites. Web proxies give people the ability to surf anonymously online with ease, by visiting one of our networked sites, anyone in the world can surf under our IP address in America. This brings many advantages, e.g. in China the government restrict people access to a lot of web sites (The Great Firewall Of China), but by using one of our sites, people from China can bypass the firewall and appear from the USA. Another example is when a typical college student wants to access a site which is blocked by the college filter system (e.g. MySpace!), we offer these students the ability and freedom to access blocked sites.

 8)

Also look at the widget code. http://www.privax.us/widget/
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

timecube

  • Subordinate Wasp
  • ***
  • Posts: 230
Re: Waxworms
« Reply #36 on: January 11, 2010, 04:46:34 AM »
It seems you need to use wi fi to connect to a router that has Net Nanny or some other keyword firewall that blocks porn installed on it using TOR to access a site like WD Restored and see what happens with your very own eyes  ::) 

Tor gives end to end encryption up to the exit node.  Keyword blocking isn't going to affect it unless you have something on your computer interfering with your browser or (more likely) you don't have your browser set up to use Tor properly.  Get Firefox and the Tor plugin.

Santa Claus

  • Guest
Re: Waxworms
« Reply #37 on: January 11, 2010, 05:14:44 AM »
WizardX:  If the URL of the privax proxy server is known, can't it be blocked? Tor gets around this problem, although I can't claim to understand how it's done.

Lugh:  There are several very thorough anonymity check sites on the web. Here are two recommended by the JAP security test page at http://jap.inf.tu-dresden.de/help/jap_help/en/help/security_test.html

The first of these offers a comprehensive set of tools to make the assessment. The second is faster and easier to interpret. As JAP puts it--

Browserspy contains a huge list with identification criteria and elaborate tests. http://browserspy.dk/

Leader.ru gives an overview to different identification criteria. http://www.leader.ru/secure/who.html

BTW, there's no need to use WiFi. I understand why you recommend it, but if your IP and MAC address cannot be determined there's no benefit.

PP

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Waxworms
« Reply #38 on: January 11, 2010, 04:45:56 PM »
SWIL used JAP for many years until their funding was cut and it became virtually useless  ;) Benson and Conroy are undoubtedly planning on incarcerating those who are caught up in their web of lies, so using wi fi is only common sense in the face of such behavior  ::)
Chemistry is our Covalent Bond

Prepuce

  • Mighty Bhagwan
  • Subordinate Wasp
  • ***
  • Posts: 100
Re: Waxworms
« Reply #39 on: January 12, 2010, 08:01:45 AM »
Lugh, I knew that there were a few incidents when the developers of JAP were forced by the German police to track down one of the users. In fact they talked about it on their website. I also used them for several years, but finally stopped because they got so slow. I did not know of allegations of "misdeeds" by the main organization, although I recall reading that connecting through one of the other JAP servers that had been established might not offer the same security.

BTW, I'll take responsibility for the post by santa claus, above. Yesterday I was feeling maybe too jolly, but not today.

PP
Support the never ending quest for new and better hedonicants. Send your gift today to:

 N & B H Foundation, Attn. Bhagwan SP
 University of Massachusetts at Los Angeles
 PO Box 6.02 X 10^23
 Houston, MD 884411