Feasibility of Using TOR or VPNs For Anonymity
StealthMonger
StealthMonger at nym.mixmin.net
Tue Feb 22 17:32:49 PST 2011
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
m0lt1 <m0lt1wl at gmail.com> writes:
> I've been told TOR and VPNs are heralded for their anonymizing
> properties however the skeptic in me says that there are some
> serious failing points.
Your skepticism is fitting. In fact, even the TOR documentation
concurs:
... for low-latency systems like Tor, end-to-end traffic
correlation attacks [8, 21, 31] allow an attacker who can observe
both ends of a communication to correlate packet timing and volume,
quickly linking the initiator to her destination.
http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf
> So, how does one engage in electronic communication whilst
> maintaining anonymity from governments, business, and rambunctious
> infosec techies?
uinmyn: Is this anonymous browsing, or what?
http://groups.google.com/group/alt.privacy.anon-server/browse_thread/thread/089c8f2f251c207e?fwc=1
stealthmail: Hide whether you're doing email, or when, or with whom.
mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html
> In short, I need to be able to disassociate my real identity with
> this pseudonym effectively enough to "hide" from governments and
> third parties...
Good stuff. Stick with it.
-- StealthMonger <StealthMonger at nym.mixmin.net>
Long, random latency is part of the price of Internet anonymity.
Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ <http://mailcrypt.sourceforge.net/>
iEYEARECAAYFAk1kNbsACgkQDkU5rhlDCl70agCcCfTMPTtKxD0+LNo15a+ke1MF
WOYAnRhiZXg5Vxvr9i2cjan7Vgx0zMvw
=P6aB
-----END PGP SIGNATURE-----
More information about the cypherpunks-legacy
mailing list