Feasibility of Using TOR or VPNs For Anonymity
StealthMonger at nym.mixmin.net
Tue Feb 22 17:32:49 PST 2011
-----BEGIN PGP SIGNED MESSAGE-----
m0lt1 <m0lt1wl at gmail.com> writes:
> I've been told TOR and VPNs are heralded for their anonymizing
> properties however the skeptic in me says that there are some
> serious failing points.
Your skepticism is fitting. In fact, even the TOR documentation
... for low-latency systems like Tor, end-to-end traffic
correlation attacks [8, 21, 31] allow an attacker who can observe
both ends of a communication to correlate packet timing and volume,
quickly linking the initiator to her destination.
> So, how does one engage in electronic communication whilst
> maintaining anonymity from governments, business, and rambunctious
> infosec techies?
uinmyn: Is this anonymous browsing, or what?
stealthmail: Hide whether you're doing email, or when, or with whom.
mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html
> In short, I need to be able to disassociate my real identity with
> this pseudonym effectively enough to "hide" from governments and
> third parties...
Good stuff. Stick with it.
-- StealthMonger <StealthMonger at nym.mixmin.net>
Long, random latency is part of the price of Internet anonymity.
Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ <http://mailcrypt.sourceforge.net/>
-----END PGP SIGNATURE-----
More information about the cypherpunks-legacy