![]() ![]() * Sending lots of random garbage traffic between relays such that input and output is meaningless overall, perhaps relaying packets to several nodes needlessly, when only a single node is instructed to actually do something with it. * Pad traffic substantially with garbage such that the outgoing size cannot be associated with whatever came in, potentially splitting packets in half so that they can appear smaller than they actually are, forking around many different nodes. * Not process traffic in the order in which its received, obfuscating the cause-and-effect of a packet being received and a packet going out This is how most packet shaping works, no?Īt a minimum, I would expect Tor to be more secure by having nodes: Why not? I'm talking about shuffling queues such that it cannot be determined that a given node is relaying traffic in the order that it receives it. ![]() > you just can't add delays to TCP streams. Maybe Tor, too, but just don't use it anywhere near devices or a residence that's obviously yours. Preferably suburban areas with more empty space and trees than cameras. If worried about publicity, use cantennas so folks can't see your face on camera. I did anonymous activities using equipment bought in cash over WiFi and HTTPS-looking connections to blend in with the less-interesting crowd. I assume the FBI gets a part of it which will grow over time, concealing how they got the information. That lets them hit today's systems or encrypted data with future attacks. Endnote for mac northwestern plus#Plus lots of storage to keep as much encrypted traffic as they can as long as they can. ![]() Endnote for mac northwestern full#Global visibility into traffic patterns on top of huge, attack budget for partial or full defeats of the technology. The NSA also had attacks on most mobile OS's, backdoors in ISP's, and so on feeding stuff to FBI who supposedly had no such capabilities.ītw, the big ISP's being backdoored with high-bandwidth, Tor nodes on same networks drawing people to use them is about the worst-case scenario for Tor. They lied that cryptography is blocking them a lot in general when the data shows that's rare. Well, they also lied they couldn't break into that iPhone to try to get a court ruling that made it unnecessary to use expensive contractors or secret exploits. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |