Pixel Dust Is Futile
Peter Gutmann's pixel dust protection of privacy works as an update for faith in elaborately futile shenanigans to evade and to nab evaders inherently implanted in fetuses then re-implanted in corpses: dust to dust. Logs are as deceptive and who, what and how they log. Machine designers and sysadmins artfully possessive documentaries inherently evasive and capturing. At 12:04 AM 2/5/2015, coderman wrote:
On 2/4/15, John Young <jya@pipeline.com> wrote:
Darknet is hardly dark, or no more than Tor anonymizes, ...
true; perhaps best quantified as: "no ISP asshattery". but fails like all earth human technology in face of capable attacker with significant resources.
[ specifically, onion overlay avoids TCP RST, DNS redir, local network ARP poisoning, IPv4/IPv6 BGP route jacking, transport privacy and authenticity** attacks (rewrite proxy) ]
** key management, someone has to do it. and it is always cumbersome...
but that is nary a sliver in the sky of surface exposed, in typical "rich web service" context, full of javascript and media handlers and plug-ins, oh my!
tell us John, do your server logs show mostly complete or incomplete downloads of Cfour? :P
participants (1)
-
John Young