[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8e5ffb560512261741g17348f4dta2f620d536338d6a@mail.gmail.com>
Date: Tue Dec 27 01:41:43 2005
From: gautam.bipin at gmail.com (Bipin Gautam)
Subject: Spy Agency Mined Vast Data Trove
>
> ipsec, ssl, ssh, openvpn, lots of methods for data privacy. (i am
> looking forward to tun/tap device support in new openssh. openvpn is
> a bit tedious)
>
> regarding anonymity, tor is no longer funded by the eff and is
> accepting donations. if you found this project useful now is a good
> time to donate: http://tor.eff.org/donate.html.en
>
i don't think i can truly trust tor. If there is something that i
want spies to really NOT know about i'd choose to route my data
through some proxy, encrypted channel, and with a different identity
which doesn't routed through USA or its aliances.
Further more if the communication is just plain text like WWW, smtp
etc. with all that resource you can easily predict a uniq identity
with his behavoir pattern, online. Think what is the first thing that
you/(your computer) almost do after logging in to internet everyday?
maybe within first 1 hour....... P2P, smtp, IRC, IM, WWW what else.
Maybe a ssl tunnel to SomeThingSecret.com Most of the things you do
the first hour and your topic of intrest are almost* same everyday
(maybe so is your OS and browser fingerprints)
Another biggest clue to identify YOU even if you route your traffic
through tor like network setup/VPN etc is your language pattern that
you can tap in the recerver side (which could be unencrypted) (if its
a NON native english speaker its even more uniq) I can identify a hand
full of my close friends/associates UNIQUELY by their language pattern
even if they change their emails or names to try to fool me. The way
they use their word, grammer, punctuation, spelling mistakes,
incertion of foreign words in the vocab. the abbeverations etc. With
all that data going through the neural analytical engine to create a
uniq fingerprint of every person. Once the basics is done..... it
would be a childs play to co-relate all the data and private
communication one to another and further more create a strong
heuristic database. By that way it would be very difficult to protect
your true identity. Ya, you can always fool all of those once you are
aware of the new facts. It it might be like fooling your parents that
you feel uneasy because those guys might have been monitoring all of
us from our first hello in the internet.
say; If they know i am a bad guy and figure out Mr. A (a non technical
user) is my friend... all it takes is best wishes to me to my tour to
France. (there blows my undercover)
I believe its more about the computation and resources they have than
anything truly secret tricks that they are using without our
knowledge. Hell anyways, the more you are relie/live around
technology... the more you are exposed.
second thing is atlest from our government till now; they don't spy
our traffic.I know because i know.
The more uniq (patterns) you are the more easy you are to be
identified from the heard.
regards, (ya this signature is also uniq ;)
-bipin
Powered by blists - more mailing lists