|
supra
computerEnthusiast
Registered: 10/26/03
Posts: 6,446
Loc: TEXAS
Last seen: 12 years, 9 months
|
Re: Nerotik's Network Security and Anonymity Guide. [Re: AdoX]
#9823139 - 02/18/09 10:25 PM (14 years, 11 months ago) |
|
|
nice, but if your trying to protect yourself from people that have the power to watch both ends of your connection(ala US govt.), doing jumps through a bunch of proxies can't really help protect you. It does help for small time agencies, but if someone is REALLY out to get you, TOR alone won't stop them.
peace
|
supra
computerEnthusiast
Registered: 10/26/03
Posts: 6,446
Loc: TEXAS
Last seen: 12 years, 9 months
|
Re: Nerotik's Network Security and Anonymity Guide. [Re: Alan Rockefeller]
#9829955 - 02/19/09 09:54 PM (14 years, 11 months ago) |
|
|
Quote:
Alan Rockefeller said:
Quote:
nice, but if your trying to protect yourself from people that have the power to watch both ends of your connection(ala US govt.), doing jumps through a bunch of proxies can't really help protect you. It does help for small time agencies, but if someone is REALLY out to get you, TOR alone won't stop them.
I disagree, I think tor will stop US government eavesdropping at the network level.
See http://www.torproject.org/overview.html.en
Only the last hop is in the clear, they can sniff that but they probably wouldn't know that its from you.
The problem is that they can just as easily watch the traffic as it leaves your house for the first time, intercepting before it hits your ISP or any proxies...then figure out where its trying to go, and watch the final destination as well, making the hops useless.
Again, its much much better than having nothing at all, but not protecting if someone is REALLY interested in what you are doing online.
peace
|
supra
computerEnthusiast
Registered: 10/26/03
Posts: 6,446
Loc: TEXAS
Last seen: 12 years, 9 months
|
Re: Nerotik's Network Security and Anonymity Guide. [Re: abetterlie]
#9834625 - 02/20/09 04:57 PM (14 years, 11 months ago) |
|
|
Quote:
abetterlie said: Not to knock your guide, cos its awesome, but hasn't it been proven that tor is a pretty dangerous way to protect your anonymity due to endpoint node sniffing? I read somewhere that UN guys were using it to send emails, and the traffic at the end of the tunnels was being sniffed and compromised. I realize that this is less of a concern for guys here, but still...
http://www.civiblog.org/blog/_archives/2007/11/15/3355919.html
There are better articles elsewhere but I can't find any.
Has anyone here tried using relakks? https://www.relakks.com/?cid=gb
just to note, I'm a security geek, nice to meet you, awsome to proliferate this stuff to everyone. Advocate truecrypt! FireGPG for encrypted emails with gmail! tinfoil hats for all!!!
yeah, you were able to put it much more elegantly than I...
peace
|
|