... and wikileaks will be officially classified as a terrorist organization. I am curious as to how Tor operators will be viewed in all of this ... as ISPs or as material accomplices ?
On Mon, Nov 29, 2010 at 08:01:50PM +0000, John Case wrote:
... and wikileaks will be officially classified as a terrorist organization.
Don't forget these torrent terrorists. Most dangerous people.
I am curious as to how Tor operators will be viewed in all of this ... as ISPs or as material accomplices ?
Someone to harass. Which has been the usual mode of operation, in Southern Germany in regards to exits at least. -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
On Mon, Nov 29, 2010 at 3:01 PM, John Case <case@sdf.lonestar.org> wrote:
... and wikileaks will be officially classified as a terrorist organization.
I am curious as to how Tor operators will be viewed in all of this ... as ISPs or as material accomplices ?
I wouldn't be surprised if it didn't take too long before Wikileaks became a very interesting target to the US gov't and her allies. I don't think Tor operators will get too much flak in terms of personality or MO, but this exposure may cause disruptions to the project.
On Mon, 29 Nov 2010, Justin Bull wrote:
On Mon, Nov 29, 2010 at 3:01 PM, John Case <case@sdf.lonestar.org> wrote:
... and wikileaks will be officially classified as a terrorist organization.
I am curious as to how Tor operators will be viewed in all of this ... as ISPs or as material accomplices ?
I wouldn't be surprised if it didn't take too long before Wikileaks became a very interesting target to the US gov't and her allies. I don't think Tor operators will get too much flak in terms of personality or MO, but this exposure may cause disruptions to the project.
Tor has been in LEA (FBI++) sights for a long time now - just as the remailer system was under heavy scrutiny before it. I have zero doubt that the fedz run many nodes. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech
On Mon, Nov 29, 2010 at 5:56 PM, J.A. Terranson <measl@mfn.org> wrote:
Tor has been in LEA (FBI++) sights for a long time now - just as the remailer system was under heavy scrutiny before it. I have zero doubt that the fedz run many nodes.
As a beginner in the crypto field, I thought Tor was actually quite secure. Seeing that is not the case, what is regarded as a safe, anonymous browsing practise? And, as far as I know, monitoring an exit node only reveals the destination address, not the sender... Is that really a security issue?
On Mon, 29 Nov 2010, Justin Bull wrote:
On Mon, Nov 29, 2010 at 5:56 PM, J.A. Terranson <measl@mfn.org> wrote:
Tor has been in LEA (FBI++) sights for a long time now - just as the remailer system was under heavy scrutiny before it. I have zero doubt that the fedz run many nodes.
As a beginner in the crypto field, I thought Tor was actually quite secure. Seeing that is not the case, what is regarded as a safe, anonymous browsing practise? And, as far as I know, monitoring an exit node only reveals the destination address, not the sender... Is that really a security issue?
Certainly, however, that's not something Tor is really designed to mask - Tor is designed to mask the people requesting services via Tor. While Tor is likely quite secure in most respects, good intelligence does not necessarily require that the content of any request be known: there are many facets to any communication, and things like the existence of a particular target is certainly usable intel. Tor is designed to inhibit a number of attacks, including traffic analysis, but there is *no* absolute guarantee that every possible attack is known, or even just coded for. If your life relies on anonymity services, you will likely be a whole lot more careful than if it's seen as something you "merely provide to others on extra bandwidth". //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Justin Bull <justin.bull@sohipitmhz.com> writes:
As a beginner in the crypto field, I thought Tor was actually quite secure. Seeing that is not the case, what is regarded as a safe, anonymous browsing practise? And, as far as I know, monitoring an exit node only reveals the destination address, not the sender... Is that really a security issue?
If by "secure" you mean that the individual doing the browsing cannot be traced, note that in any low-latency Internet access, packet timing correlations between the parties can easily confirm any suspected linkage. As the Tor documentation itself states, ... for low-latency systems like Tor, end-to-end traffic correlation attacks [8, 21, 31] allow an attacker who can observe both ends of a communication to correlate packet timing and volume, quickly linking the initiator to her destination. http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf More difficult to trace is Internet access by email via the remailer network. See my "uinmyn", URL below. -- StealthMonger <StealthMonger@nym.mixmin.net> Long, random latency is part of the price of Internet anonymity. uinmyn: Is this anonymous surfing, or what? http://groups.google.com/group/alt.privacy.anon-server/browse_thread/thread/... stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite@nym.mixmin.net?subject=send%20index.html Key: mailto:stealthsuite@nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8+ <http://mailcrypt.sourceforge.net/> iEYEARECAAYFAkz0SW0ACgkQDkU5rhlDCl5brgCgv4m4G4Z0NhXE76YkwhmrfJYL CKYAniic1yodWVjzAkCL5e4oWoIPzyV1 =Rye4 -----END PGP SIGNATURE-----
On Mon, 29 Nov 2010, John Case wrote:
... and wikileaks will be officially classified as a terrorist organization.
I am curious as to how Tor operators will be viewed in all of this ... as ISPs or as material accomplices ?
Likely as a co-conspirator. This way, grand juries (who have zero clue to start with, and even less after the dog and pony show by the prosecutor) its easier to get warrants to go fishing on any domestic Tor participant. Thousands of potential "terrorists" for the price of a single subpoena :-( //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech
On Mon, 29 Nov 2010, J.A. Terranson wrote:
I am curious as to how Tor operators will be viewed in all of this ... as ISPs or as material accomplices ?
Likely as a co-conspirator. This way, grand juries (who have zero clue to start with, and even less after the dog and pony show by the prosecutor) its easier to get warrants to go fishing on any domestic Tor participant. Thousands of potential "terrorists" for the price of a single subpoena :-(
Running a Tor node that is easily traceable back to your own real world identity is, I think, very foolish. Unfortunately, the Tor mailing list is full of people running them from their residential Internet connection or their college dorm room.
On Mon, 29 Nov 2010, John Case wrote:
On Mon, 29 Nov 2010, J.A. Terranson wrote:
I am curious as to how Tor operators will be viewed in all of this ... as ISPs or as material accomplices ?
Likely as a co-conspirator. This way, grand juries (who have zero clue to start with, and even less after the dog and pony show by the prosecutor) its easier to get warrants to go fishing on any domestic Tor participant. Thousands of potential "terrorists" for the price of a single subpoena :-(
Running a Tor node that is easily traceable back to your own real world identity is, I think, very foolish.
Unfortunately, the Tor mailing list is full of people running them from their residential Internet connection or their college dorm room.
Agreed. I also know of at least two rather large exit nodes (>3mbps) being run under actual identities. Foolish, but common. It is very unfortunate that many people don't really understand what it is they are undertaking in providing anonymity services. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech
On Mon, Nov 29, 2010 at 05:30:46PM -0600, J.A. Terranson wrote:
Agreed. I also know of at least two rather large exit nodes (>3mbps) being
Rather large fill up a 100 MBit/s line or a GBit/s line.
run under actual identities. Foolish, but common. It is very unfortunate that many people don't really understand what it is they are undertaking in providing anonymity services.
I don't get it. -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
On Tue, 30 Nov 2010, Eugen Leitl wrote:
run under actual identities. Foolish, but common. It is very unfortunate that many people don't really understand what it is they are undertaking in providing anonymity services.
I don't get it.
What they are undertaking is an unpredictable, unlimited future liability. Even without anything interesting, like packet inspection, or state inspection, it's easy to assume that all Internet traffic is logged somewhere - just connection logs and so on - a trivial amount of data to save, and gets more trivial every six months when bigger drives come out. So _today_ your actions might be benign, and tomorrow they might also be benign, but what about next year or next decade or ... When you have a permanent record of all of your transactions in Internet-space, it's just a matter of time before that is mined for something that you never intended, and much like selling stocks short, your risk here is unlimited. Unlike selling stocks short, your risk never expires. Remember - the bolsheviks went back to old storerooms of 30 year old slips of paper, long forgotten, even by the Tsars themselves, and picked through them, page by page, decades later, to find out who to murder. Don't run a Tor node under your own name, or traceable back to yourself with simple traffic analysis, even in "sane" countries.
On Tue, Nov 30, 2010 at 08:28:21PM +0000, John Case wrote:
What they are undertaking is an unpredictable, unlimited future liability.
Sure.
Even without anything interesting, like packet inspection, or state inspection, it's easy to assume that all Internet traffic is logged somewhere - just connection logs and so on - a trivial amount of data to save, and gets more trivial every six months when bigger drives come out.
So _today_ your actions might be benign, and tomorrow they might also be benign, but what about next year or next decade or ...
In a society that far gone this only raises the stakes of armed resistance. Fight or flight are both perfectly preferable to playing sitting duck, waiting for black vans to pick you up.
When you have a permanent record of all of your transactions in Internet-space, it's just a matter of time before that is mined for something that you never intended, and much like selling stocks short, your risk here is unlimited. Unlike selling stocks short, your risk never expires.
Remember - the bolsheviks went back to old storerooms of 30 year old slips of paper, long forgotten, even by the Tsars themselves, and picked through them, page by page, decades later, to find out who to murder.
As some day it may happen that a victim must be found, I've got a little list--I've got a little list Of society offenders who might well be underground, And who never would be missed--who never would be missed!
Don't run a Tor node under your own name, or traceable back to yourself with simple traffic analysis, even in "sane" countries.
We shouldn't be afraid. They should. -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
On Tue, 30 Nov 2010, Eugen Leitl wrote:
Even without anything interesting, like packet inspection, or state inspection, it's easy to assume that all Internet traffic is logged somewhere - just connection logs and so on - a trivial amount of data to save, and gets more trivial every six months when bigger drives come out.
So _today_ your actions might be benign, and tomorrow they might also be benign, but what about next year or next decade or ...
In a society that far gone this only raises the stakes of armed resistance. Fight or flight are both perfectly preferable to playing sitting duck, waiting for black vans to pick you up.
Look, if running a Tor node anonymously was difficult, this conversation would be interesting. But unning a Tor node anonymously is trivial, so the cost/benefit analysis is pretty parabolic. No cost, all benefit. Unless you're actually part of the project, or a public supporter, etc., there is no reason to have your identity attached to Tor in any way.
On Tue, Nov 30, 2010 at 08:57:31PM +0000, John Case wrote:
Look, if running a Tor node anonymously was difficult, this conversation would be interesting.
But unning a Tor node anonymously is trivial, so the cost/benefit analysis is pretty parabolic. No cost, all benefit.
This is interesting to me personally. How would you run a Tor node anonymously, without breaking the bank? Apart from offshore incorporation or finding a host that takes cash or anonymous prepaid cards it appears not obvious. -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
Hi Eugen, On Tue, 30 Nov 2010, Eugen Leitl wrote:
On Tue, Nov 30, 2010 at 08:57:31PM +0000, John Case wrote:
Look, if running a Tor node anonymously was difficult, this conversation would be interesting.
But unning a Tor node anonymously is trivial, so the cost/benefit analysis is pretty parabolic. No cost, all benefit.
This is interesting to me personally. How would you run a Tor node anonymously, without breaking the bank?
Apart from offshore incorporation or finding a host that takes cash or anonymous prepaid cards it appears not obvious.
There's a few ways to approach this. First, there are a LOT of co-location/vps/webhost resellers operating in the US, and almost no regulation of them as "ISPs". The big famous ones that do shell hosting and irc and all of that will not work - they are very vigilant about customer validation because they get so much CC fraud. But if you can find a joe-blow VPS reseller or datacenter reseller and call them up like any other vendor, they will bend over backwards to take your money. They're not going to ask for your drivers license or a credit check or anything like that. You can just mail them a postal money order or two and be done with it. Most give you a discount for paying a year in advance, so that's convenient. The other way to approach it is much more convenient, but potentially more risky, and that is to use an assumed name with your own credit card. You will find that most CC auths are done based on the numbers, and not on your actual name. Try it - you can set up a working amazon account with your own CC and a totally bogus name. Since most (all ?) merchants are required by their banks to dispose of the CC information, or never hold it in the first place after authorization, after your transaction they are left with your bogus information (but correct address) and either a hash or the last four of your CC. This is worth considering, since we aren't guarding against "being raided right now", but rather against future data mining ... and if future data mining traces an IP back to an account that had (possibly) the same address as you ... it gets a bit hazy there. The hunt is for a name, and that name is not there. So that's some food for thought - I have it on good authority that all of the above works very well ... and we haven't even gotten to prepaid visa cards, which aren't exactly rocket science to procure and use...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 John Case <case@sdf.lonestar.org> writes:
But unning a Tor node anonymously is trivial...
First, there are a LOT of co-location/vps/webhost resellers operating in the US, and almost no regulation of them as "ISPs"....
... if you can find a joe-blow VPS reseller or datacenter reseller and call them up like any other vendor, they will bend over backwards to take your money. They're not going to ask for your drivers license or a credit check or anything like that. You can just mail them a postal money order or two and be done with it.
Earlier he wrote
Even without anything interesting, like packet inspection, or state inspection, it's easy to assume that all Internet traffic is logged somewhere - just connection logs and so on - a trivial amount of data to save, and gets more trivial every six months when bigger drives come out.
So _today_ your actions might be benign, and tomorrow they might also be benign, but what about next year or next decade or ...
When you have a permanent record of all of your transactions in Internet-space, it's just a matter of time before that is mined for something that you never intended...
So, what can be done with that Tor node once it's set up? It can't be used interactively (i.e. with low latency) because that "permanent record of all of your transactions in Internet-space" can be used today or tomorrow or "next year or next decade or ..." to correlate packet timings and destroy whatever anonymity the Tor node might otherwise have had. And if the Tor node is configured to respond to instructions anonymized by a remailer network, the remailer network might as well have by used by itself in the first place, without the Tor node in the picture at all. -- StealthMonger <StealthMonger@nym.mixmin.net> Long, random latency is part of the price of Internet anonymity. uinmyn: Is this anonymous surfing, or what? http://groups.google.com/group/alt.privacy.anon-server/browse_thread/thread/... stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite@nym.mixmin.net?subject=send%20index.html Key: mailto:stealthsuite@nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8+ <http://mailcrypt.sourceforge.net/> iEUEARECAAYFAkz2ty8ACgkQDkU5rhlDCl5UuwCYiWFCq487jiwKEWJ5+JTZ5eYM kgCfTriJZWDJ1j0jfxdC+AKpMEyu5tc= =Z0jC -----END PGP SIGNATURE-----
On Thu, 2 Dec 2010, StealthMonger wrote:
So, what can be done with that Tor node once it's set up? It can't be used interactively (i.e. with low latency) because that "permanent record of all of your transactions in Internet-space" can be used today or tomorrow or "next year or next decade or ..." to correlate packet timings and destroy whatever anonymity the Tor node might otherwise have had. And if the Tor node is configured to respond to instructions anonymized by a remailer network, the remailer network might as well have by used by itself in the first place, without the Tor node in the picture at all.
Oh - a very interesting question, and something I didn't think of, for reasons I will expain now ... You see, if you have the ability to set up an anonymous Tor node, then you wouldn't be using Tor _yourself_. By definition, Tor usage is only for people that can't safely set up their own Tor node. Make sense ? If you are running a Tor node, you're doing it for altruistic reasons - for people that have an immediate, right now need for privacy, and need to tweet the next meet-up spot, future risk be damned. You, yourself, on the other hand, do not need this - you're a rich, well educated computer savvy type that can set up all kinds of interesting infrastructure for yourself and defeat the threat model I am talking about - not with Tor, but with (insert interesting privacy architecture here). If you can run your own Tor node anonymously, you've got tunnels within tunnels, exiting at random points around the world ... right ? Right.
On Tue, Nov 30, 2010 at 2:34 PM, Eugen Leitl <eugen@leitl.org> wrote:
... This is interesting to me personally. How would you run a Tor node anonymously, without breaking the bank?
Apart from offshore incorporation or finding a host that takes cash or anonymous prepaid cards it appears not obvious.
there are a lot who do take anonymous pre-paid cards. i've been using this method for years for servers and other services. purchase the cards with cash or barter. you can load up to $500 without difficulty. you pay a $5 or so fee per card; avoid anything that charges percentages loaded. you have a year to use it, usually, before fees start whittling down the balance. you can register the cards on-line with privacy preserving billing detail. be sure to consider country/state of billing address if this matters for your purchase. (note that Tor is not the only anonymous option for this :) once registered with card holder name, address, use as you would any other Visa/MC/Amex... (there once was a company called CoinStar. they let you feed bills into a kiosk to load cash onto Visa plastic which it spat out right there. you could add currency to an existing card just the same. alas, they had to change their model due to pressures. while it is hard to find prepaid systems this convenient and privacy empowering, they do come round now and then. still, point-of-sale purchase is not so bad compared to the alternatives...)
On Wed, 1 Dec 2010, coderman wrote:
you can load up to $500 without difficulty. you pay a $5 or so fee per card; avoid anything that charges percentages loaded. you have a year to use it, usually, before fees start whittling down the balance.
you can register the cards on-line with privacy preserving billing detail. be sure to consider country/state of billing address if this matters for your purchase. (note that Tor is not the only anonymous option for this :)
once registered with card holder name, address, use as you would any other Visa/MC/Amex...
there are a lot of them; it's a $24,000,000,000+ industry after all, ... i have not seen a privacy oriented comprehensive index of prepaid systems. that would be useful, if anyone has seen such a thing. On Wed, Dec 1, 2010 at 9:58 PM, John Case <case@sdf.lonestar.org> wrote:
On Mon, Nov 29, 2010 at 11:18:00PM +0000, John Case wrote:
Running a Tor node that is easily traceable back to your own real world identity is, I think, very foolish.
In saner places it's ok.
Unfortunately, the Tor mailing list is full of people running them from their residential Internet connection or their college dorm room.
Shouldn't be a problem, in saner places. -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
On Mon, Nov 29, 2010 at 12:01 PM, John Case <case@sdf.lonestar.org> wrote:
... and wikileaks will be officially classified as a terrorist organization.
if this did happen, a more interesting question is what happens to the US citizens who are or would be providing material support to Wikileaks. (you may not remain a US citizen, for example :)
On Thu, Dec 02, 2010 at 01:27:41PM -0800, coderman wrote:
On Mon, Nov 29, 2010 at 12:01 PM, John Case <case@sdf.lonestar.org> wrote:
... and wikileaks will be officially classified as a terrorist organization.
if this did happen, a more interesting question is what happens to the US citizens who are or would be providing material support to Wikileaks. (you may not remain a US citizen, for example :)
I'm quite looking forward to what will happen when I have to take a transatlantic flight the next time. Not that I intend to, but one can never know. -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
participants (6)
-
coderman
-
Eugen Leitl
-
J.A. Terranson
-
John Case
-
Justin Bull
-
StealthMonger