managing and protecting nyms...
John Case
case at sdf.lonestar.org
Fri Nov 6 09:02:51 PST 2009
On Fri, 6 Nov 2009, StealthMonger wrote:
>> I don't use a nym-server. Usually. There are other ways to get
>> comparable anonymity.
>
> Please explain other ways to be practically untraceable.
Shell providing and VPS providing is a cut throat business. It might take
a few contacts (with a throwaway yahoo email you create through Tor) but
you _will_ find someone to take your money (in cash). Lifetime or
multi-annual payments in advance usually do the trick.
The previously mentioned Simon gift cards could fit into this, but why
bother.
Never touch the account, save through Tor. So it's the same model you use
with a nym-server, but whereas all of your obfuscation is after your email
account, all of this obfuscation is prior to the email account (through
Tor).
@ John Young:
> Cypherpunks should be the last place to disclose a protection
> methodology except, perhaps, only perhaps, as a ploy to deceive.
>
> Recall repeated warnings here to never disclose in a public
> forum an ultimate protection scheme. Spread copious FUD,
> hope it sticks. Could be that is what this thread is about.
I don't know that this even rises to the level of a "protection
methodology" - it's more along the lines of "survey the current landscape
and choose an available, and obvious route". As for robustness, either
Tor is broken/vulnerable or it's not.
@ Eugen Leitl:
>> My threat model is an unknown future adversary with unpredictable
>> motivations.
>
> Weird. I can think of many current adversaries with very simple
> motivations I can do very little to nothing about. This assymmetry
> will only grow further in future, since the concentration of smarter,
> more vulnerable hardware will only get larger, and the delta
> between my and their capabilities will only grow wider.
Sorry - I was obtuse there. What I meant was, in addition to the
technical unknowns that grow over time, and the predictable and visible
social pressures, there are also the acute unknowns - like french
revolutions and bolsheviks and "year zero" folks. Those are the unknowns
who could just as easily be after anyone that advocated net neutrality, or
supported Tor or spoke on behalf of anonymity as they are after obvious
bozos who blatantly threaten public figures.
That's why _I_ keep a firewall between my real self and my nyms - year
zero types don't need a good reason, they just need fuel, period.
> My only protection is that I'm not doing anything which could
> draw their (not meaning flatfeet or gumshoes here) attention.
Of course. Goes without saying. But I think there is actually a lot less
distance (in terms of danger) between assassination politics and "just
talking about Tor".
Or maybe the future revolutionary just fat-fingers the database query.
Either way, your name comes up.
More information about the cypherpunks-legacy
mailing list