There are numerous difficulties associated with TOR that are not really the
fault of TOR, but are consequences for how the internet is designed.  There
is nothing in the structure of the Internet that was designed to protect
privacy.

Well funded adversaries can have a large number of machines act as routers
and exit points, and by manipulating traffic delays at various hops, they
can disambiguate a large percentage of the traffic that flows through the
TOR network (some headlines this past year have suggested ~3/4 of all
traffic can have the source be de-anonymized).  There is simply no way to
work around this.

There is also no place on the planet that is safe from large state actors,
particularly the NSA.  I use VPNs to obscure my traffic from the ISPs that
I use and to have a little control over the routing that my packets take.
I am under no illusion that any of this protects me from the CSE or NSA (or
any other such exceptionally well funded organizations).

None of this protects against OS and browser fingerprinting.  You can still
be tracked based on the services that you connect to.  Chances are that
most of those services will hand your data over to various agencies with
little to no effective judicial oversight.  Just forgetting to log-off from
a site like facebook means that every site with a Facebook like button
leaves a trail that Facebook records.  This is also true of the other
"social" networks.  It does not matter if you use TOR or any other
technology.

A final word about encryption.  It is helpful to think of encryption as a
time lock.  All it really does is to slow down access to the encrypted
data.  The math is sound, but there can still be (or more accurately
probably are) flaws in the various implementations.  Never assume that
encrypted data is safe, especially data at rest (data stored on a cloud
service for example).  If complete privacy is what you want, the Internet
is not a good place to get it.

Again we circle back to figuring out exactly what you want to protect and
from whom.  Ask and answer this question first before even considering
technical solutions.  Unfortunately there are no simple solutions, and
there is a lot of work required both in the learning and implementation.

On Fri, Apr 3, 2015 at 12:32 AM, Viorel Tabara <viorel.tab...@infrabit.net>
wrote:

> On 03/12/2015 01:38 PM, Gustin Johnson wrote:
> > Even TOR which was designed to do this as much as possible is far from
> > perfect (essentially best case is that TOR provides a 50/50 chance that
> your
> > privacy is maintained).
>
> Gustin, I couldn't find anything about the 50/50 privacy, if you have any
> pointers can you share?
>
> > This can have some advantage in that your exit point can be in a
> different
> > legal jurisdiction, but never assume that you are protected. [...] Your
> > browser is still connecting to the same endpoints, the web sites still
> use
> > various tracking methods to uniquely identify your connection, and none
> of
> > this is solved by a VPN.
>
> If Joe is looking for anonymity while browsing, then a simple solution is
> using
> the Tor browser (which provides https, protection against canvas
> fingerprinting
> etc.) over an SSH socks tunnel to a VPS outside NSA (and friends)
> jurisdiction.
> If the SSH tunnel dies the browser won't connect, here's an output from my
> session:
>
>    Apr 02 22:42:47.000 [notice] Bootstrapped 90%: Establishing a Tor
> circuit
>
>    Apr 02 22:42:48.000 [notice] Tor has successfully opened a circuit.
> Looks
>    like client functionality is working.
>
>    Apr 02 22:42:48.000 [notice] Bootstrapped 100%: Done
>
>    Apr 02 22:42:49.000 [notice] New control connection opened from
> 127.0.0.1.
>
>    ...
>
>    Apr 02 23:34:20.000 [warn] The connection to the SOCKS5 proxy server at
>    127.0.0.1:44380 just failed. Make sure that the proxy server is up and
>    running.
>
>    Apr 02 23:34:21.000 [warn] The connection to the SOCKS5 proxy server at
>    127.0.0.1:44380 just failed. Make sure that the proxy server is up and
>    running.
>
> This will make an interesting reading for everyone interested in privacy:
>
>
> http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance
>    https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
>    https://tails.boum.org/doc/about/warning/index.en.html
>
> --
> Viorel
>
>
>
> _______________________________________________
> clug-talk mailing list
> clug-talk@clug.ca
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> **Please remove these lines when replying
>
_______________________________________________
clug-talk mailing list
clug-talk@clug.ca
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to