Feasibility of Using TOR or VPNs For Anonymity

StealthMonger StealthMonger at nym.mixmin.net
Tue Feb 22 17:32:49 PST 2011


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

m0lt1 <m0lt1wl at gmail.com> writes:

> I've been told TOR and VPNs are heralded for their anonymizing
> properties however the skeptic in me says that there are some
> serious failing points.

Your skepticism is fitting.  In fact, even the TOR documentation
concurs:

   ... for low-latency systems like Tor, end-to-end traffic
   correlation attacks [8, 21, 31] allow an attacker who can observe
   both ends of a communication to correlate packet timing and volume,
   quickly linking the initiator to her destination.

   http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf

> So, how does one engage in electronic communication whilst
> maintaining anonymity from governments, business, and rambunctious
> infosec techies?

   uinmyn: Is this anonymous browsing, or what?
   http://groups.google.com/group/alt.privacy.anon-server/browse_thread/thread/089c8f2f251c207e?fwc=1

   stealthmail: Hide whether you're doing email, or when, or with whom.
   mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html

> In short, I need to be able to disassociate my real identity with
> this pseudonym effectively enough to "hide" from governments and
> third parties...

Good stuff.  Stick with it.

 -- StealthMonger <StealthMonger at nym.mixmin.net>
    Long, random latency is part of the price of Internet anonymity.

Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ <http://mailcrypt.sourceforge.net/>

iEYEARECAAYFAk1kNbsACgkQDkU5rhlDCl70agCcCfTMPTtKxD0+LNo15a+ke1MF
WOYAnRhiZXg5Vxvr9i2cjan7Vgx0zMvw
=P6aB
-----END PGP SIGNATURE-----





More information about the cypherpunks-legacy mailing list