lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue Dec 27 01:41:43 2005
From: gautam.bipin at gmail.com (Bipin Gautam)
Subject: Spy Agency Mined Vast Data Trove

>
> ipsec, ssl, ssh, openvpn, lots of methods for data privacy. (i am
> looking forward to tun/tap device support in new openssh.  openvpn is
> a bit tedious)
>
> regarding anonymity, tor is no longer funded by the eff and is
> accepting donations.  if you found this project useful now is a good
> time to donate: http://tor.eff.org/donate.html.en
>

i don't think i can truly trust tor.  If there is something that i
want spies to really NOT know about i'd choose to route my data
through some proxy, encrypted channel, and with a different identity
which doesn't routed through USA or its aliances.

Further more if the communication is just plain text like WWW, smtp
etc.  with all that resource you can easily predict a uniq identity
with his behavoir pattern, online. Think what is the first thing that
you/(your computer) almost do after logging in to  internet everyday? 
 maybe within first 1 hour.......  P2P, smtp, IRC, IM, WWW what else.
Maybe a ssl tunnel to SomeThingSecret.com  Most of the things you do
the first hour and your topic of intrest are almost* same everyday
(maybe so is your OS and browser fingerprints)

Another biggest clue to identify YOU even if you route your traffic
through tor like network setup/VPN etc is your language pattern that
you can tap in the recerver side (which could be unencrypted)  (if its
a NON native english speaker its even more uniq) I can identify a hand
full of my close friends/associates UNIQUELY by their language pattern
even if they change their emails or names to try to fool me. The way
they use their word, grammer, punctuation, spelling mistakes,
incertion of foreign words in the vocab. the abbeverations etc. With
all that data going through the neural analytical engine to create a
uniq fingerprint of every person. Once the basics is done..... it
would be a childs play to co-relate all the data and private
communication one to another and further more create a strong
heuristic database. By that way it would be very difficult to protect
your true identity. Ya, you can always fool all of those once you are
aware of the new facts. It it might be like fooling your parents that
you feel uneasy because those guys might have been monitoring all of
us from our first hello in the internet.

say; If they know i am a bad guy and figure out Mr. A (a non technical
user) is my friend... all it takes is best wishes to me to my tour to
France. (there blows my undercover)

I believe its more about the computation and resources they have than
anything  truly secret tricks that they are using without our
knowledge. Hell anyways, the more you are relie/live around
technology... the more you are exposed.

second thing is atlest from our government till now; they don't spy
our traffic.I know because i know.

The more uniq (patterns) you are the more easy you are to be
identified from the heard.

regards, (ya this signature is also uniq    ;)
-bipin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ