From: JB on
whome? wrote:

> Your ISP logs your IP and the IP of the Tor Destination point. The
> ISP for the Tor connections also logs the Source and Destination IPs
> of all the Tor connections.

Doesn't matter. They can log all day long, and still not be privy
to which encrypted data stream belongs to what user.

> >If one believes TOR security, you can surf anonymously.
>
> Wrong. Tor is only a VPN between your pc and the Tor exit connection.
> You only hide various sites beyond the Tor exit point from your ISP.
> Nothing more.

Wrong. Tor is absolutely nothing like a VPN. It's technically a
SOCKS proxy. But regardless of what label you put on the
system, because of the layers of encryption and sequential
stripping thereof, true anonymity is achieved.

From: JB on
hummingbird wrote:

> 'Spamblk' wrote thus:
>
> >Forgive me for poking my nose in this with my 2 cents worth. AFAIK the
> >Internet has still the basic architecture based on packet switching as set
> >out years ago by persons such as Vint Cerf and Robert Kahn. So when you
> >send out information to TOR (or whatever) your packets at the first stage
> >go to your local network.
>
> Packets going from your Tor browser to your ISP are encrypted.

You're confused. There's no such thing as a "Tor browser". Tor is
essentially a distributed SOCKS proxy. Packets traveling from your
browser to the instance of Tor you're using are *not* encrypted.
This is basically meaningless in practice because in most cases
your running instance of Tor is on the same machine as your browser
or other "Torified" client, but it's not *always* the case. And if
you don't get the basics straight you'll never be able to
comprehend and deal with any of it.

From: JB on
Spamblk wrote:

> whome? wrote in news:tbfsk5905v3d3s8celq1t2h6vcj3edveus(a)4ax.com:
>
>
>
> > The Tor server has an IP. Your ISP logs your
> > IP and the Tor IP. Once your packets hit the tor server, the
> > encryption is removed, and the packets continue to your desired web
> > site. The Tor server has an ISP like you and I do. The Tor ISP logs
> > all its traffic, including the Tor exit packets. The only thing Tor
> > does is make your traffic BLIND to your ISP only. Any cop can unmask
> > you with minimal effort, especially in the UK. Tor is not worth the
> > time.
>
> Forgive me for poking my nose in this with my 2 cents worth. AFAIK the
> Internet has still the basic architecture based on packet switching as set
> out years ago by persons such as Vint Cerf and Robert Kahn. So when you
> send out information to TOR (or whatever) your packets at the first stage
> go to your local network.

Actually, they do not. At least not in any way that anyone at that
"first stage" can discern.

Your original packets are encrypted multiple times before they ever
leave your machine (assuming a typical setup here). Those packets
remain completely hidden behind that encryption until they reach the
other side of the Tor network. At that point they're in the clear
again, but all information regarding who originated them has been
lost.

Back to the envelope analogy...

You write a letter to "Dave" and put it in an envelope addressed
to him. That's your "original packet". That letter goes in an
envelope addressed to "Tom". That package goes in an envelope
addressed to "Mary", and the whole mess goes once again in an
envelope, addressed to "Bob".

You now have a crafted "packet" with absolutely no distinguishing
marks on it which say anything about the destination of your letter
to Dave. It is in fact and practice a brand new packet, addressed
to Bob.

You mail this packet to Bob. The postal service (ISP) sees the
letter as a packet to Bob. Because that's precisely what it is.
They have exactly two pieces of information... the fact that you
sent a letter, and the fact that it was delivered to Bob.

Bob opens his letter and finds another addressed to Mary. Bob mails
the letter. The postal service sees the letter. They have no clue
that it was originally inside the letter to Bob. They see a letter
going from Bob to Mary, still completely oblivious to the fact that
inside a couple more layers of envelopes there exists a letter to
Dave. They're now also oblivious to the fact that it originated from
you.

Mary gets her letter and opens it, finding a letter to Tom. Mary is
*completely* clueless. All she knows is that she got a letter from
Bob with a letter to Tom inside it. She can't know the real origin
of the letter, she can't know the ultimate destination, and she
certainly can't read the letter. She's the "key" to the whole
thing. The point at which source and destination become
strangers. :)

Mary mails the letter to Tom, who opens it to *finally* find the
original letter to Dave. Until that point in time nobody could have
that information. It was hidden behind several layers of strong
encryption "envelopes". Your "packet" has traveled from point 'A'
to point 'B' without any of its real routing information exposed to
the public. Tom, of course, learns that the ultimate destination is
Dave. And he can read the letter if it's not also encrypted. But he
can never know that the letter originated from you. He can't know it
because the hop just before him can't know it. The letter still
travels, and eventually does make it to Dave, but it's taken on a
"side trip" and metaphorically blindfolded for the duration. ;)

> I can't see a way you can hide your packets from
> your ISP or Default Gateway which are on the first few network hops (which
> you can view using a utility such as traceroute (TRACERT if using MSDOS).
> It is possible to prevent the destination website from knowing and/or
> logging your real IP address, that is a different matter.
>
> The original post was about privacy. You can have privacy on your local
> computer (but not on the wider Network), but it requires you to re-organise

You can have privacy on the WAN too. That's what things like SSL
are for. That sort of end to end encryption is all about keeping
your information between you and those who you chose to share it
with. Casual observers, including your ISP, are rendered oblivious
to the content of your communications. They know who you're talking
to, but not what you're saying. It's very similar to the way you
might tell someone you have a doctor's appointment, but not that
it's to have the doctor look at that strange rash that seems to not
want to go away. ;)

> your affairs quite a bit. There is not only the issue of a browsers
> history, but there are also "Local Shared Objects" used by internal and
> external flash players, see

There's all manner, shape, and form of threats out there. Simply
caching images is a threat. It's what allows things like "web
bugs". Typically they're tiny, transparent or even single pixel
images with unique names, that web sites use to track your
movements by way of watching which images are downloaded and which
are refreshed from your cache as you move from page to page.

And that sort of risk isn't mitigated by ram disks or sand boxes.
The only way to fight it is to disallow the caching of images
entirely. I'm not even sure most browsers can be configured that
way with any sort of certainty.

This is why it's vital that we understand the differences between
privacy and anonymity, and how they overlap. If web bugs are a
concern and you don't want to neuter your web browser entirely, a
truly anonymous connection can maintain your privacy by forcing
your "attacker" to track a nameless, faceless entity. :)

>
> http://en.wikipedia.org/wiki/Local_Shared_Object
> http://en.wikipedia.org/wiki/Default_gateway
>
> Computers also open files in the directory indicated by the TEMP or TMP
> environment variables. It would be an idea to assign these variables to a
> ramdisk or directory you can wipe later if you are looking for privacy and
> you are not operating inside a suitable sandbox.

That addresses "forward privacy". What someone might discover in
the future forensically, for lack of a better term. Immediate
privacy is another matter all together. Keeping things to yourself
in real time presents a different types of problems than keeping it
safe after the fact.

From: JB on
whome? wrote:

> On Wed, 13 Jan 2010 11:56:29 -0500, JB <none(a)server.null> wrote:
>
> >whome? wrote:
> >
> >> Who said you could use the web anonymously? If you use Tor or
> >> whatever, there is an IP address at each end. There is no such thing
> >> as anonynous web usage.
> >
> >Wrong.
> >
> >Tor does indeed provide hard anonymity.
> >
> >That anonymity comes from it being mathematically unfeasible for
> >*anyone* to collate an IP on one side of the Tor network with an IP
> >on the other. Yes, both are visible to casual observers, but it's
> >impossible to know that the IP on the exit side of Tor is being
> >used by any given user at their IP address on the entry side.
> >Multiple layers of strong, public key encryption see to that.
>
> Man, you are stubborn.

I get that way when I'm right. Sorry. :)

> The Tor server has an IP. Your ISP logs your
> IP and the Tor IP. Once your packets hit the tor server, the
> encryption is removed,

Wrong. Wrong wrong wrong.

Once the encrypted package "hits the Tor server" the *first* layer
of encryption is removed. The first envelope is opened. At that
point the operator of the first node sees nothing but another
encrypted packet (envelope) with the address of the next Tor node
on it. It's impossible for that operator to know the ultimate
destination of the original packet because it's still hidden behind
strong encryption. And it's also all mixed up with thousand and
thousands of other, similarly encrypted packets.

At the second node in the Tor network another layer of encryption
is stripped away. That operator, agian, can only see another
envelope with the address of another node on it. This "middle"
operator can't even know where the encrypted packet originated
from, let alone where it's going.

NOTE: The "magic number" here is three. It's the bare minimum that
places a node in the middle which is completely oblivious to all
three of the things you need to collate traffic and users...
source, destination, and content.


> and the packets continue to your desired web
> site. The Tor server has an ISP like you and I do. The Tor ISP logs

Again, you're oblivious to how the Tor network functions. The
envelope analogy is simple, and a good one. Consider it carefully
and you'll (hopefully) begin to understand that while these nested
envelopes are out there traveling around the system, the ultimate
"inner envelope" is obfuscated to the point that real anonymity is
achieved.


> all its traffic, including the Tor exit packets. The only thing Tor
> does is make your traffic BLIND to your ISP only.

Wrong. SSL will blind your ISP (and others) to your traffic. That's
what tools like that are for in essence. Tor will do this too, but
that's merely a side effect of Tor's reason for being... to
disassociate content, and originator. Tor, as an entity, does *not*
privatize your data. Once it reaches an egress point it's in the
public domain, so to speak.

> Any cop can unmask
> you with minimal effort, especially in the UK. Tor is not worth the
> time.

Nope. You're mistaken because you don't yet understand what it is
that the Tor network does.

From: JB on
hummingbird wrote:

> 'JB' wrote thus:
>
> >hummingbird wrote:
> >
> >> >Private browsing is about keeping your information to yourself.
> >> >Period. Part of that process *can* be housecleaning, but it's not
> >> >inherently necessary. More to the point are things like filtering
> >> >"super cookies" during a session, watching for script kiddie attacks
> >> >like invasive JavaScript and such, and yes, even intercepting full
> >> >blown malware before it can gain purchase on your machine.
> >> >
> >> >The whole concept is not disseminating information about yourself
> >> >and your surfing habits beyond a certain well defined point, not
> >> >keeping that information *from* yourself entirely. In truth, wiping
> >> >everything is an inconvenience at best, and overkill in essence.
> >>
> >> All good stuff but it looks more like a recipe for good security,
> >> rather than 'private browsing'.
>
>
> >Wow. You really are confused.
>
> Actually I think you are.

I'm sure you do. But then up until recently you also "thought" that
privacy and anonymity were synonymous, and that security had
nothing to do with privacy.
>
> >Privacy is all about security.
>
> Where did I say otherwise?

Message-ID: <1df7e299a7fe65a2dcc7e961c203b521(a)aracari.org>

"All good stuff but it looks more like a recipe for good security,
rather than 'private browsing'."

You can deny your own words all you want. And try to hide behind
X-No-Archive. It won't change anything. You misspeak, I correct
you, and when you realize how wrong you were and how excellent my
explanations are, you lie and say that you really meant the same
thing I said.

>
> >Privacy can't exist without
> >effective security. Using the doctor analogy again, your doctor
> >doesn't leave your medical records lying around in the waiting
> >room. He keeps them in a file cabinet in some sort of "restricted
> >area", and probably locked up when not being accessed. Physical
> >security, plain and simple. Your doctor also most assuredly has a
> >policy in place to deal with employees and such who break the
> >doctor-patient confidence. The first line of defense is not hiring
> >them. That means things like background checks and interviews. More
> >forms of security. Information gathering and analysis. Threat
> >assessment, if you will.
>
> We were debating our understanding of the terms 'security'
> -vs- 'private browsing' in the context of the Internet. The
> former is usually applied to system security and, well, we know

What a load of baloney. Now you're just trying to cloud the issue
with petty semantics quibbling. "Usually applied to..."?

Puhlllllease...

One more time the facts:

Privacy and anonymity are two different things that can sometimes
overlap in application.

Neither privacy nor anonymity can exist without good security.

'nuf said.

First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Prev: u-tube
Next: "Progress" [was: Scanner driver]