Home | Community | Message Board

Avalon Magic Plants
This site includes paid links. Please support our sponsors.


Welcome to the Shroomery Message Board! You are experiencing a small sample of what the site has to offer. Please login or register to post messages and view our exclusive members-only content. You'll gain access to additional forums, file attachments, board customizations, encrypted private messages, and much more!

Jump to first unread post Pages: 1
Anonymous #1

Re: Nerotik's Network Security and Anonymity Guide. [Re: decaf]
    #26173895 - 09/07/19 09:03 AM (4 years, 4 months ago)

Please don't distribute this as a PDF. The format is horribly insecure for everyone.

From the reader's perspective, PDFs can run scripts and connect to the internet. What's the point of publishing a PDF about Tor when the document itself can connect to a server and bypass Tor's IP address obfuscation? Besides the inherent risk of the document being able to run arbitrary programs. The Tor Browser is dead simple to use, being a hardened Firefox fork that automagically establishes a secure network connection.

From the writer's perspective, there's too much damn metadata. It sounds like your guide has embedded screenshots. Did you strip the metadata from these images before adding them to the PDF? What about the metadata of the PDF itself? The only way to make a clean PDF is to copy its contents into a fresh document without metadata.

On Tor itself, please know your use case! It's not an invisibility cloak for the internet, rather a highly visible anomaly on the network. Tor traffic glows on the wire, but all Tor traffic looks the same. You should use Tor at a public access point with a spoofed MAC address. Otherwise you're pointing a neon arrow at your workstation that says, "I have something to hide."

That's actually how they caught the Harvard bomb threat guy: check the logs to see who on campus used Tor when the bomb threat was sent. All he had to do was walk across the street to a cafe and spoof his MAC address before connecting.

Edit: Sorry, I didn't realize this thread is 10+ years old. Oh well, it's already bumped.


Edited by Anonymous (09/07/19 09:06 AM)


Extras: Unfilter Print Post Top
Jump to top Pages: 1


Similar ThreadsPosterViewsRepliesLast post
* Internet Security abhi 966 2 06/27/04 10:45 PM
by Vvellum
* Remote Desktop Management for Novell Networks HidingInPlainSight 1,126 6 01/20/04 09:56 PM
by nife
* The BASICS of Securing your computer and E-mail. Cyber 2,674 12 06/09/09 03:34 PM
by Alan Rockefeller
* Tor: An anonymous Internet communication system garbage 932 1 04/10/05 08:59 AM
by newuser1492
* Secure Email theocean06 1,420 12 01/24/05 08:58 AM
by nife
* Metadata jonsnow 378 4 08/18/13 10:32 PM
by Bacchus
* securing my Linux box monoamine 505 1 07/05/04 08:05 PM
by Cyber
* security test Xochitl 1,200 5 11/02/03 03:03 PM
by Kid_Orgo

Extra information
You cannot start new topics / You cannot reply to topics
HTML is disabled / BBCode is enabled
Moderator: Enlil, Alan Rockefeller
8,554 topic views. 0 members, 1 guests and 1 web crawlers are browsing this forum.
[ Show Images Only | Sort by Score | Print Topic ]
Search this thread:

Copyright 1997-2024 Mind Media. Some rights reserved.

Generated in 0.025 seconds spending 0.007 seconds on 17 queries.