So any good tips on this subject? Are we safe from the NSA with SSH v2? SSL? General thoughts?
Re: Rise of the Dark Nets
By: S/370 to All on Fri Aug 16 2013 09:52 pm
So any good tips on this subject? Are we safe from the NSA with SSH v2? SSL? General thoughts?
I think ubiquitous encryption helps. Encrypt your email to your friends, you shopping list, your secret love letters. Get a VPN, route everything through it. Run your web traffic through SSL through an SSH tunnel through your
VPN. Increase the amount of crap that needs to be encrypted exponentially.
Re: Rise of the Dark Nets
By: Poindexter Fortran to S/370 on Sat Aug 17 2013 08:06 am
Re: Rise of the Dark Nets
By: S/370 to All on Fri Aug 16 2013 09:52 pm
So any good tips on this subject? Are we safe from the NSA with SSH v SSL? General thoughts?
I think ubiquitous encryption helps. Encrypt your email to your friends, shopping list, your secret love letters. Get a VPN, route everything thro it. Run your web traffic through SSL through an SSH tunnel through your VPN. Increase the amount of crap that needs to be encrypted exponentially
Although encrypting everything cannot hurt, I am afraid that it is impossibl to have private realtime communication. At best encryption can hide the what but even mixers like tor cannot hide the whoms which could be enough to targ someone for more direct surveillance. Probably the best we can hope for is a store and forward network that sends all traffic to everyone. That will let encrypt and decrypt with some assurance that the whoms cannot be derived.
Although encrypting everything cannot hurt, I am afraid that it is impossible to have private realtime communication. At best encryption can hide the whats, but even mixers like tor cannot hide the whoms which could be enough to target someone for more direct surveillance.
Probably the best
we can hope for is a store and forward network that sends all traffic to everyone. That will let us encrypt and decrypt with some assurance that the whoms cannot be derived.
Re: Rise of the Dark Nets
By: Poindexter Fortran to S/370 on Sat Aug 17 2013 08:06 am
Re: Rise of the Dark Nets
By: S/370 to All on Fri Aug 16 2013 09:52 pm
So any good tips on this subject? Are we safe from the NSA with SSH v2? SSL? General thoughts?
I think ubiquitous encryption helps. Encrypt your email to your friends, you shopping list, your secret love letters. Get a VPN, route everything through it. Run your web traffic through SSL through an SSH tunnel through your VPN. Increase the amount of crap that needs to be encrypted exponentially.
Although encrypting everything cannot hurt, I am afraid that it is impossible to have private realtime communication. At best encryption can hide the whats, but even mixers like tor cannot hide the whoms which could be enough to target someone for more direct surveillance. Probably the best we can hope for is a store and forward network that sends all traffic to everyone. That will let us encrypt and decrypt with some assurance that the whoms cannot be derived.
---
■ Synchronet ■ The X-BIT BBS * http://x-bit.org * http://x-bit.org/777.htm
To be honest, I still don't understand the concept of VPNs.
That's a good point. I read an article recently about an IT specialist who got convicted of possessing child pornography. Although his hard drives were encrypted, the judge ordered him to turn over the passwords to decrypt them. Self incrimination? The judge says its not because he is already assumed to be guilty! So much for innocent until proven guilty.
So any good tips on this subject? Are we safe from the NSA with SSH v2? SSL? General thoughts?
Although encrypting everything cannot hurt, I am afraid that it is impossibl to have private realtime communication. At best encryption can hide the what but even mixers like tor cannot hide the whoms which could be enough to targ someone for more direct surveillance. Probably the best we can hope for is a store and forward network that sends all traffic to everyone. That will let encrypt and decrypt with some assurance that the whoms cannot be derived.
A lot of people also tend to overlook the concept of exit nodes when it come to tor. Tor is a great program as long as it is used properly. But if I read the documentation correctly, it seems that the exit node can see everything unencrypted.
Damn, that was an informative read! That PGP story reminds me of what happened with DES. Basically NSA wanted IBM to reduce the key length in the algorithm. I think I'll look into PGP 2.3a a little more.
Re: Re: Rise of the Dark Nets
By: Khelair to S/370 on Sat Aug 24 2013 03:24:28
That's the thing. Considering that the US Navy originally developed tor, I wouldn't be surprised if a good number of the exit nodes are run by the US government. But personallly I haven't heard any stories of people being busted on tor (yet), so maybe its safer than it looks. Nevertheless,
someone mentioned I2P so I'll try reading more about that.
---
■ Synchronet ■ electronic chicken bbs - bbs.electronicchicken.com
Re: Rise of the Dark Nets
By: S/370 to Poindexter Fortran on Thu Aug 22 2013 06:05 am
That's a good point. I read an article recently about an IT specialist who got convicted of possessing child pornography. Although his hard drives were encrypted, the judge ordered him to turn over the passwords to decrypt them. Self incrimination? The judge says its not because he is already assumed to be guilty! So much for innocent until proven guilty.
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
---
■ Synchronet ■ realitycheckBBS -- http://realitycheckBBS.org
That's the thing. Considering that the US Navy originally developed tor, I wouldn't be surprised if a good number of the exit nodes are run by the US government. But personallly I haven't heard any stories of people being bust on tor (yet), so maybe its safer than it looks. Nevertheless, someone mentio I2P so I'll try reading more about that.
Re: Re: Rise of the Dark Nets
By: S/370 to Khelair on Mon Aug 26 2013 03:02:27
That's the thing. Considering that the US Navy originally developed tor, wouldn't be surprised if a good number of the exit nodes are run by the U government. But personallly I haven't heard any stories of people being b on tor (yet), so maybe its safer than it looks. Nevertheless, someone men I2P so I'll try reading more about that.
Yeah, I've thought about the exit node issue, too. After all, that's ho good portion of the wikileaks information got pwned, too. If you'll remembe Assange came on the scene, and it's not like you can just advertise "Leak al your info to us! Be the first!" When they got on the scene they already ha millions of leaked cables and documents. It was from running tor exit nodes Thing about that is that you still can't determine the original sender's IP from the information that flows from them, so if you are careful enough with your online habits, you've still got a decent degree of protection. Using t alone really isn't a good defense if you're still logging in to the same accounts, with the same passwords, from the same location, etc etc etc. Tor site has a lot of documentation about proper usage of it that is pretty valuable.
Unfortunately, I just came across the news yesterday that the NSA has ma some massive, but thoroughly unspecific, advances in decrypting common encrypted data. So it doesn't really specify if that is for SSL/SSH/PGP, or what, but it really should make a person reconsider what they're willing to commit to digital media in the first place. I can't find the exact link tha first read it at, but here is one referencing the same information that came courtesy of Ed Snowden: http://tinyurl.com/oc3avnp Needless to say, I'm reassessing my previous assertions that the PGP 2.3a algorithm, even, is sti an issue for the NSA to crack.
Came across this while I was looking for that last link, too. Ugh I clo the link but it should be easy enough to google. Looks like anybody with decent sniffing capabilities on your data can get through SSL pretty easily.
Oh as far as people being busted on tor, also... Look up the massive wa of child porn busts that the federal government made not too long ago. Thos were all related to federal interception of tor data and/or bitcoin data.
-The opinions expressed are not necessarily an advocation of any of the aforementioned ideologies, concepts, or actions. We still have the freedom speech, for now, and I enjoy using it in a satirical or ficticious manner to amuse myself-
"In times of universal deceit, telling the truth will be a
revolutionary act." -- George Orwell
Yeah, I've thought about the exit node issue, too. After all, that's how a good portion of the wikileaks information got pwned, too.
Anyone here interested in a PGP key exchange?
Re: Re: Rise of the Dark Nets
By: Khelair to S/370 on Fri Aug 30 2013 09:45 am
Yeah, I've thought about the exit node issue, too. After all, that's how a good portion of the wikileaks information got pwned, too.
Yep, TOR protects where you're coming from, not what you're sending.
Anyone here interested in a PGP key exchange?
---
■ Synchronet ■ realitycheckBBS -- http://realitycheckBBS.org
S/370 wrote to Kc2ugv <=-
I've been meaning to ask for a long time, but is this BBS encrypted through telnet? I probably sound like a retard for saying it. But I
tried sniffing my own packets and couldn't find my own password or username in plain text. Maybe its a Synchronet feature I don't know
about. :)
Sysop: | Eric Oulashin |
---|---|
Location: | Beaverton, Oregon, USA |
Users: | 106 |
Nodes: | 16 (0 / 16) |
Uptime: | 03:41:39 |
Calls: | 5,896 |
Calls today: | 12 |
Files: | 8,496 |
D/L today: |
70 files (14,683K bytes) |
Messages: | 345,000 |
Posted today: | 2 |