this post was submitted on 20 Sep 2024
175 points (96.8% liked)

Privacy

31284 readers
828 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] endofline@lemmy.ca 1 points 1 hour ago

I think the only still secure network is i2p. In there you don't have the exit node

[–] some_guy@lemmy.sdf.org 9 points 13 hours ago

I have considered Tor safe for illicit activities for at least half a decade. Luckily, there's no need for me to be on there. But this is bad news for people living in places where speech is heavily regulated plus journalists and would-be whistle-blowers.

[–] h4lf8yte@lemmy.ml 20 points 20 hours ago (1 children)

As I read, they used timing analysis which should be preventable by using an anonymous VPN to connect to tor and streaming something over the VPN connection at the same time. Some of them support multi-hop, like mullvad, which will further complicate the timing analysis because of the aggregated traffic.

[–] hate2bme@lemmy.world 1 points 7 hours ago

How do you get an anonymous VPN? I see mullvad has a pay in cash option. Is that how?

[–] sumguyonline@lemmy.world 17 points 22 hours ago (2 children)

First, randomize your mac, shutdown anything that can "dial home" (updates, sync, logged in apps, etc) then connect to internet then anonymous VPN, then connect to the tor network, use an anonymized browser with NO java enabled, never download anything -copy paste text, and screen cap images-, if your network drops the popo's are trying to do a "reconnect" attack to see if they can get an unprotected connection to the material you were looking at. Use a livedisk on USB and you likely won't get bios level attacks, as live disks make it harder to access your bios. Source: a boring ass individual that just wants the gov off their jock strap, suck it Joe my FBI agent, you know what you did.

[–] PM_Your_Nudes_Please@lemmy.world 3 points 11 hours ago

This looks like it was a timing analysis attack. Basically, they’re trying to figure out which user did something specific. They match the timing of the event with the traffic from the user, and now they know which user did the thing.

It can be fuzzed by streaming something at the same time, because now your traffic is way harder to time analyze when you have a semi-constant stream of data running. But streaming something over Tor is an exercise in patience, (and it’s not something the typical user will just always have running in the background) so timing analysis attacks are gaining popularity.

[–] sunzu2@thebrainbin.org 3 points 18 hours ago

a boring ass individual that just wants the gov off their jock strap, suck it Joe my FBI agent, you know what you did.

I also prefer my feds to earn their keep, I pay them good money for it.

[–] ExtremeDullard@lemmy.sdf.org 38 points 1 day ago (13 children)

The TOR network itself is safe - at least assuming the TLAs don't control at least half of the nodes, which is far from impossible. But let's assume...

The weak point comes from the browser: that's how the fuzz deanonymizes users. The only safe browser to use on TOR is the TOR browser, and that's the problem: it disables so many unsafe functionalities that it's essentially unusable on a lot of websites. So people use regular browsers over TOR, the browser leaks identifying data and that's how they get caught.

[–] Trainguyrom@reddthat.com 6 points 17 hours ago

I mean, the advice I've heard for one who's threat model is "the feds are actively trying to identify me" is to have a dedicated burner computer that you do all of your illegal activities on and no other activities. Then of course on top of that avoid saving secrets onto the device and type them in manually every time (ephemeral distros like Tails are good for that)

[–] delirious_owl@discuss.online 8 points 22 hours ago (1 children)

My understanding is that Tor Browser works fine, there's just some dumb website owners that block Tor traffic by IP address.

[–] CCRhode@lemmy.ml 10 points 20 hours ago (1 children)

And ... guess what ... www.bleepingcomputer.com, the source of the story, is one of those.

[–] delirious_owl@discuss.online 7 points 19 hours ago* (last edited 19 hours ago)

Maybe email them and let them know about the misconfiguration

Let them know that tor users can't read their article about Tor

load more comments (11 replies)
[–] possiblylinux127@lemmy.zip 7 points 22 hours ago

What are you going to use instead?

Tor is the best tool you just need to know how to use it

[–] ShortN0te@lemmy.ml 57 points 1 day ago (15 children)

This attack has been known for years now. And tor is simply not able to defend against it without a complete redesign.

[–] orcrist@lemm.ee 29 points 1 day ago (1 children)

The potential for timing attacks has been known since the beginning of Tor. In other words, more than a decade. But that doesn't mean you can't defend against it. One way to defend against it is by having more nodes. Another way is to write clients that take into account the potential for timing attacks. Both of these were specifically mentioned in the article.

Based on what was in the article and what's in the history books, I'm not sure how to interpret your comment in a constructive way. Is there anything more specific you meant, that isn't contradicted by what's in the article?

load more comments (1 replies)
load more comments (14 replies)
load more comments
view more: next ›