synthetikal.com Forum Index


General Rules of Anonymity
Goto page Previous1, 2
Post new topic   Reply to topic    synthetikal.com Forum Index -> Computer Security
Author Message
brixtonj

Joined: 29 Mar 2005
Posts: 24
Location: Brixton , London SW9
902.26 Points

Wed Mar 30, 2005 7:17 am
Reply with quote

MargaretThatcher wrote:
Why do you trust the people in Anonymizer?


If you use Anonymizer, this is exactly what you have to do. Who runs them or does anyone else have a tap into their servers? You don't know. Is there anything to stop them doing this? No. The situation is the same with all commercial anonymizing services. JAP was compromised and were decent enough to let on. The others may not be.

You say we should trust them. Why?

If you want an anonymizing proxy, use TOR. The source code is open and the setup makes it very difficult to snoop.


Hi again ! . I dont know really why to trust anonymizer people. Well , Its their business. and if they leak data to LEAs , sooner or later that would be known with catastropical consecuences for them .I really like their idea about encrypting back the tcp--packets, but ... who knows.

am gonna hava look at that TOR thing... , but if it relies on someone' else servers.. we still got the same problem (that server could log all your traffic).

J.
Back to top
MargaretThatcher

Joined: 16 Feb 2005
Posts: 142
4420.96 Points

Wed Mar 30, 2005 5:29 pm
Reply with quote

TOR uses onion routing: it is a proxy chain. It comprises many nodes linked together, a kind of distributed proxy that is very difficult to compromise.

Data is routed through the TOR network with layers of encryption : each node can peel back only the layer it has the key for (hence onion routing). A node doesn't know the final destination or inital source of the packets it routes. The design of TOR means that an adversary would need to be running most of the TOR nodes to compromise the network. You can contribute a server node to the network yourself if you have the bandwidth. If you choose to run a server node for TOR you can choose whether to keep all the data internal or allow your node to be an exit node. The latter case might attract attention if illegal activity happens to exit through your node.
Back to top
mind

Joined: 10 Feb 2005
Posts: 39
362.48 Points

Wed Mar 30, 2005 6:12 pm
Reply with quote

http://tor.eff.org/overview.html



sometimes a picture says more then 1000 words..
Back to top
auttie

Joined: 02 Jun 2005
Posts: 18
588.80 Points

Thu Jun 02, 2005 10:41 am
Reply with quote

as far as proxies go the best choice in my eyes.. is tor its a onion proxy meaning it connects you to a encrypted host.. and then bounces you around a whole lot between other encrypted tor hosts before you hit the real world.. its really quite nice =]. Also I strongly urge people to make a switch to linux especialy if they are concerned with security or anonymity. I would be happy to help people get started in that direction.. and teach what I know about the hardened encryption/security software linux utilizes. http://tor.eff.org/overview.html tor is easy to download and install I have tested it on linux and osx systems I would be interested to hear how it works in windows..
Back to top
auttie

Joined: 02 Jun 2005
Posts: 18
588.80 Points

Thu Jun 02, 2005 10:43 am
Reply with quote

O wow I only read the first page of posts hehe looks like some people beat me to tor!! tor rocks my socks (v5)
Back to top
auttie

Joined: 02 Jun 2005
Posts: 18
588.80 Points

Thu Jun 02, 2005 10:44 am
Reply with quote

O wow I only read the first page of posts hehe looks like some people beat me to tor!! tor rocks my socks (v5)
Back to top
loki
guinea pig
Joined: 09 Mar 2005
Posts: 391
14167.88 Points

Thu Jun 02, 2005 11:41 am
Reply with quote

ya tor is good, i use it, but i keep turning it off cos it's a bit slow sometimes. if i had more upload bandwidth i'd run a permanent node but 256k up gets crowded pretty fast.

just turned it on again after seeing it mentioned. If the synthetikal server was running a tor node it would be possible to access the webserver via a hidden service, end to end onion routing PLUS ssl... can't get much more difficult to get at than that. I don't know if the server is running on windows or not, the tor server node function (last time i checked) only works on linux at the moment.
Back to top
Display posts from previous:   
Post new topic   Reply to topic    synthetikal.com Forum Index -> Computer Security All times are GMT + 5.5 Hours
Goto page Previous1, 2
Page 2 of 2

 



Powered by phpBB 2.0.11 © 2001, 2002 phpBB Group

Igloo Theme Version 1.0 :: Created By: Andrew Charron