-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 m0lt1 <m0lt1wl@gmail.com> writes:
I've been told TOR and VPNs are heralded for their anonymizing properties however the skeptic in me says that there are some serious failing points.
Your skepticism is fitting. In fact, even the TOR documentation concurs: ... for low-latency systems like Tor, end-to-end traffic correlation attacks [8, 21, 31] allow an attacker who can observe both ends of a communication to correlate packet timing and volume, quickly linking the initiator to her destination. http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf
So, how does one engage in electronic communication whilst maintaining anonymity from governments, business, and rambunctious infosec techies?
uinmyn: Is this anonymous browsing, or what? http://groups.google.com/group/alt.privacy.anon-server/browse_thread/thread/... stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite@nym.mixmin.net?subject=send%20index.html
In short, I need to be able to disassociate my real identity with this pseudonym effectively enough to "hide" from governments and third parties...
Good stuff. Stick with it. -- StealthMonger <StealthMonger@nym.mixmin.net> Long, random latency is part of the price of Internet anonymity. Key: mailto:stealthsuite@nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8+ <http://mailcrypt.sourceforge.net/> iEYEARECAAYFAk1kNbsACgkQDkU5rhlDCl70agCcCfTMPTtKxD0+LNo15a+ke1MF WOYAnRhiZXg5Vxvr9i2cjan7Vgx0zMvw =P6aB -----END PGP SIGNATURE-----