Peter Gutmann's pixel dust protection of privacy works as an update for faith in elaborately futile shenanigans to evade and to nab evaders inherently implanted in fetuses then re-implanted in corpses: dust to dust. Logs are as deceptive and who, what and how they log. Machine designers and sysadmins artfully possessive documentaries inherently evasive and capturing. At 12:04 AM 2/5/2015, coderman wrote:
On 2/4/15, John Young <jya@pipeline.com> wrote:
Darknet is hardly dark, or no more than Tor anonymizes, ...
true; perhaps best quantified as: "no ISP asshattery". but fails like all earth human technology in face of capable attacker with significant resources.
[ specifically, onion overlay avoids TCP RST, DNS redir, local network ARP poisoning, IPv4/IPv6 BGP route jacking, transport privacy and authenticity** attacks (rewrite proxy) ]
** key management, someone has to do it. and it is always cumbersome...
but that is nary a sliver in the sky of surface exposed, in typical "rich web service" context, full of javascript and media handlers and plug-ins, oh my!
tell us John, do your server logs show mostly complete or incomplete downloads of Cfour? :P