Two parts: 1. Requirement: Minimise the possibility of surveillance at egress point. Surveillance of the wire between my country X and the egress country Z is not a concern. (NB: It is a concern, but not taken into account in this thought experiment) Question: If I was able to choose which country to route my IP traffic through and have act as my egress point to "the Internet public" which country would I choose? 2. Question: Is Iceland as safe as people think? Safe is defined as a location where surveillance and monitoring is minimal/non-existent. My answer: No. Thanks, Bernard -------------------------------------- Bernard / bluboxthief / ei8fdb IO91XM / www.ei8fdb.org
Look for gaps in global and national systems. Where there is limited or no services. Rig a temporary hook-up, move often, spread chaff, wipe traces. Review ham radio history of legal and illegal provenance, bootlegged and boot-strapped comms systems, illegal systems which subversively tap into legal systems, short and long-term. Study favelas, ghettos, urban poverty rigs, ingenuity-led poor countries, irrational rogue states, uncontrollable mavericks, misfits and outlaws, rebels, and huge variety of criminals, white, blue, pink, T-shirt collared. Study covert operations of many kinds and histories. They are a great many of them, past, present and future, all "under the radar," more or less, but who knows for sure. Avoid advanced countries who are manifestly in favor of ubiquitous spying at home and in other countries; their spies work in concert and in opposition but above all else hate spylessness and avidly work to infect the healthy unspied. Expect to be betrayed, deceived, tricked, given shitty advice, plagarized for good stuff, fed very bad stuff. Like this forum. Whatever you set up keep quiet about it or it will be invaded and violated. Do not feed the animals. At the moment, it would be prudent to avoid Tor which has become a favorite target and user of spies, counterspies, betrayers, opportunists, hustlers, tricksters, con artists, panhandlers, pornographers, thieves, security testers, data gobblers, sting operators, in short, no better or worse than the internet but not as bad as cellphone systems and human discourse. Read the Tor mail lists, founts of hype and disinfo: Tor Project hustlers currently advise critics "if you don't like Tor, set up your own." That is excellent advice, and a surefire indicator that that is what they have done. Yep, another Tor onion-routed below the ruse, tucked behind easily found hidden services, exited around camouflaging exits. That, to be sure, was and remains the fundamental intent of Tor: off the grid, criminal, illegal, illegitimate, government grade security.
No exit is really safe... some say pick an underdeveloped clueless state, perhaps. But those states are fed from cables that are monitored on the other end. As such, and since you can do no better, your best bet is to limit your exposure by picking an exit within the same jurisdiction as your target. You might even get lucky if said state is externally paranoid but does not care about its inside traffic.
At the moment, it would be prudent to avoid Tor which "if you don't like Tor, set up your own." That is excellent advice
Some people have a thing against Tor by default. That's probably not a very useful idea. Tor is good at what it does well, such as letting the average Jane surf out her irrelevant daily net life in relative anonymity. Just don't try to put Tor to task for the entire spectrum of what is possible without understanding what isn't. For that, you need to read a lot about it. Just like any other thing you might set up on your own.
Yep, another Tor onion-routed below the ruse, tucked behind easily found hidden services, exited around camouflaging exits. That, to be sure, was and remains the fundamental intent of Tor: off the grid, criminal, illegal, illegitimate, government grade security.
Now, who would just *love *to get people off something secure, and onto something insecure. All the while making them believe it's secure. I suppose the more secure countries are Iran, Cuba, Russia. Those are (*should be) isolated from NSA developments and should be at about public level. Russia might not be that ignorant though, best stick with Cuba. Iran and North Korea should be 100% monitored and likely don't run any Tor nodes. This is on the basis of their hostility towards America (&friends) and with that the assumption of isolation from their developments and no cooperation. China is hard to judge but might also be better than anything else. Hong Kong might be the best in China. HK is in China's womb yet, like a baby, it isn't China. All of the less-than-stable Africa seems like a good target. Too busy running crime or trying to keep stuff together to have developed international spy agencies. South Africa might have an agreement with GB/US (doesn't actually matter which) so I'd avoid them. The northern "dictator-band" has been/is being disassembled. The US is likely only involved to protect its interests now that the obedient dummy dictators are gone. That means there's no telling what the status of surveillance is, but it might be very good (iow: absent). Regardless the Internet connections are unreliable and the security will likely be US-colors soon enough. Asia except for China is hard to judge (for me). Taiwan (aka "Republic of China", hilarious story that is) is developed and connected but has had trouble getting recognition/allegiance due to the People's Republic of China. No clue about security allegiances. Can imagine it's been declaring its independence so hard it doesn't have any, and might be a good target. Any of the not-that-developed countries should be decent exit points (the whole Vietnam, Cambodia, Thailand, Laos (esp. Laos), Myanmar, Philippines, Indonesia group). (There's quite some difference between those countries, but I *think* they still end up in the same category). Singapore is a total no-go. The whole region around India I have no knowledge off. India and Pakistan are both very mixed in their level of development to a point where mass-surveillance just doesn't make sense. They're also nuclear powers, which does testify to their willingness and ability to stand up to world powers. Probably good exit points. All the middle east is probably bad because of oil/militairy interests. Special mention of Isreal as being extremely bad. Turkey too is subject to military interests and wants to be EU and whatnot so let's just avoid them. EU is all surveillance or wants to be surveillance. Eastern Europe has the developmental backlog that might've caused them to push it further down the to-do list. Greece, Italy, Spain, might be so busy not going bankrupt that they've skimped on the surveillance. Morocco and Algeria are oddballs, close to the EU but nothing else (deserts) they might've not had purpose for surveillance, yet have better connections than the rest of Africa. (Tunisia?) The world feels pretty good about the Nordic countries but I think they just tie into the US+ spynet so that makes them useless. Iceland's small population and distance to everything made it really nice, now I'm not so sure. The amount of attention means the pressure should be rising. No idea how that'll work out. The population is small enough to be smart. I suppose they're observed in any non-politically approved but still possible way. Err.. Nevermind. Enough mind games. You have to pass the wires anyway, encrypt and trust the endpoints. (and encrypt hard)
On Wed, Sep 4, 2013 at 8:20 AM, Lodewijk andré de la porte <l@odewijk.nl> wrote:
Enough mind games. You have to pass the wires anyway, encrypt and trust the endpoints. (and encrypt hard)
Which, generally speaking, will still not defeat traffic analysis without special considerations... -- @kylemaxwell
2013/9/4 Kyle Maxwell <kylem@xwell.org>
Enough mind games. You have to pass the wires anyway, encrypt and trust
On Wed, Sep 4, 2013 at 8:20 AM, Lodewijk andré de la porte <l@odewijk.nl> wrote: the
endpoints. (and encrypt hard)
Which, generally speaking, will still not defeat traffic analysis without special considerations...
I'm gonna go ahead and suggest trickle connections. It's in my paper about mesh networking that I might release once. You have n connections to n nodes (1 on 1) and you continuously flow (both directions) random data over it. Occasionally instead of random data you put an encrypted package in it. The other end continuously (tries to) decrypt packages. This way you never know if something is being sent or not, at the cost of some bandwidth. Schematically: generate random > send buffer secret package > send buffer send buffer > stream encryption > transmit buffer transmit buffer > rate limited connection to peer on the other side: receive buffer > stream decryption > package detector > usual way of dealing with incoming packages. If you never actually use these trickle connections, but you do have them, you can deny being the origin of packages (I didn't know what it was! I got it over a trickle connection!). If you mark packages as "top secret" they should only be send over trickles and they'll never be network observable at all. Additional tricks such as delayed further transmission, network path mixing, etc. are all possible with what I have in my paper and should be (easily) doable in Tor. I never really understood the problem with traffic analysis.
On Wed, Sep 4, 2013 at 9:33 AM, Lodewijk andré de la porte <l@odewijk.nl> wrote:
Additional tricks such as delayed further transmission, network path mixing, etc. are all possible with what I have in my paper and should be (easily) doable in Tor.
I never really understood the problem with traffic analysis.
Trickle connections are an interesting idea and will work for some applications where high latency and possibly low throughput are okay. I look forward to reading that paper. Though re: traffic analysis, if your traffic stands out too much (i.e. for relatively low n on a global scale), then you'll still have issues[0]. And the devil's in the details, as Tom Ritter's fine work around AAM[1] has shown. [0]: Obligatory XKCD: http://xkcd.com/1105/ [1]: http://ritter.vg/blog-deanonymizing_amm.html -- @kylemaxwell
On Wed, Sep 4, 2013 at 11:25 AM, Kyle Maxwell <kylem@xwell.org> wrote:
On Wed, Sep 4, 2013 at 9:33 AM, Lodewijk andré de la porte <l@odewijk.nl> wrote:
Additional tricks such as delayed further transmission, network path mixing, etc. are all possible with what I have in my paper and should be (easily) doable in Tor.
I never really understood the problem with traffic analysis.
Trickle connections are an interesting idea and will work for some applications where high latency and possibly low throughput are okay. I look forward to reading that paper.
Though re: traffic analysis, if your traffic stands out too much (i.e. for relatively low n on a global scale), then you'll still have issues[0]. And the devil's in the details, as Tom Ritter's fine work around AAM[1] has shown.
[0]: Obligatory XKCD: http://xkcd.com/1105/ [1]: http://ritter.vg/blog-deanonymizing_amm.html
-- @kylemaxwell
Lest we forget: WASTE had 'chaff' communication capabilities. The problem is that bandwidth isn't free; also standing out ;) -- Twitter <https://twitter.com/tbiehn> | LinkedIn<http://www.linkedin.com/in/travisbiehn>| GitHub <http://github.com/tbiehn> | TravisBiehn.com<http://www.travisbiehn.com>
2013/9/4 Travis Biehn <tbiehn@gmail.com>
The problem is that bandwidth isn't free; also standing out ;)
Any idea how much fiber/copper goes dark for extended periods of time? Remember Fidonet*? Remember 0.00000...1 == 0! Besides, what's privacy/plausible-deniability worth to you? *pairing agreements make a lot of bandwidth free both ways, after the physical connections are constructed. Problems arise when destinations aren't preferred ones, but why would you trickle towards not preferred ones? As long as you can onion route towards preferable you'll be green.
Although it's a separate conversation (Cost vs Privacy / ISPs policies etc): Domestic ISPs have caps on data and euphemistically named 'traffic shaping' policies. For many users bandwidth isn't free. On Wed, Sep 4, 2013 at 11:58 AM, Lodewijk andré de la porte <l@odewijk.nl>wrote:
2013/9/4 Travis Biehn <tbiehn@gmail.com>
The problem is that bandwidth isn't free; also standing out ;)
Any idea how much fiber/copper goes dark for extended periods of time? Remember Fidonet*? Remember 0.00000...1 == 0! Besides, what's privacy/plausible-deniability worth to you?
*pairing agreements make a lot of bandwidth free both ways, after the physical connections are constructed. Problems arise when destinations aren't preferred ones, but why would you trickle towards not preferred ones? As long as you can onion route towards preferable you'll be green.
-- Twitter <https://twitter.com/tbiehn> | LinkedIn<http://www.linkedin.com/in/travisbiehn>| GitHub <http://github.com/tbiehn> | TravisBiehn.com<http://www.travisbiehn.com>
participants (6)
-
Bernard Tyers - ei8fdb
-
grarpamp
-
John Young
-
Kyle Maxwell
-
Lodewijk andré de la porte
-
Travis Biehn