Jump to content
IGNORED

Tor


Bakemono

Recommended Posts

Posted

U duhu novonastalog vremena i kao reakcija na oblak koji se nadvija nad nama i preti da uništi našu privatnost otvaram temu o Tor-u, o kome zapravo nemam pojma ali sam ga downlodowao i želim da naučim sve o njemu. Dakle, uputstva za instalaciju, korišćenje, koje su opcije -- jednom rečju, sve što treba da se zna pišite ovde.Dakle, prvo pitanje - šta je bitno prilikom instalacije?

Posted

Ja taman mislio otvoriti temu InfoSec gde bi gurali sve, od redovnih stvari do anonimnosti.Tor... Mislim da ćeš odustati.

Posted

Pa napiši nešto više, majka mu stara.

Posted

Moram gledat 9.mart.Ne znam šta puno da ti kažem što ne možeš pročitati.Jbg nisam ga ja pravio. :DKad sam se malo zezao, bilo je užasno sporo.Neprihvatljivo sporo.I ako se prihvatiš, nemoj da si exit relay.I kao sve ima mana, dosta pluginova, javascript i sl može zeznuti stvar i otkritii tvoju ip adresu.

Posted
Pa napiši nešto više, majka mu stara.
ima sigurno i-haj ljudi pozvanijih od mene da odgovore na ovu temu, al ukratko mislim da se svodi na ovo sto njegovi sami tvorci kazu:
Performance Improvements on Toror,Why Tor is slow and what we’re going to do about itRoger Dingledine Steven J. MurdochMarch 11, 2009As Tor’s user base has grown, the performance of the Tor network has suffered. This document describes our current understanding of why Tor is slow, and lays out our options for fixing it. Over the past few years, our funding (and thus our development effort) has focused on usability and blocking-resistance. We’ve come up with a portable self-contained Windows bundle; deployed tools to handle the upcoming censorship arms race; further developed supporting applications like Vidalia, Torbutton, and Thandy; made it easier for users to be relays by adding better rate limiting and an easy graphical interface with uPnP support; developed an effective translation and localization team and infrastructure; and spread understanding of Tor in a safe word-of-mouth way that stayed mostly under the radar of censors. In parallel to adding these features, we’ve also been laying the groundwork for performance improvements. We’ve been working with academics to write research papers on improving Tor’s speed, funding some academic groups directly to come up with prototypes, and thinking hard about how to safely collect metrics about network performance. But it’s becoming increasingly clear that we’re not going to produce the perfect answers just by thinking hard. We need to roll out some attempt at solutions, and use the experience to get better intuition about how to really solve the problems.We’ve identified six main reasons why the Tor network is slow. Problem #1 is that Tor’s congestion control does not work well. We need to come up with ways to let “quiet” streams like web browsing co-exist better with “loud” streams like bulk transfer. Problem #2 is that some Tor users simply put too much traffic onto the network relative to the amount they contribute, so we need to work on ways to limit the effects of those users and/or provide priority to the other users. Problem #3 is that the Tor network simply doesn’t have enough capacity to handle all the users that want privacy on the Internet. We need to develop strategies for increasing the overall community of relays, and consider introducing incentives to make the network more self-sustaining. Problem #4 is that Tor’s current path selection algorithms don’t actually distribute load correctly over the network, meaning some relays are overloaded and some are underloaded. We need to develop ways to more accurately estimate the properties of each relay, and also ways for clients to select paths more fairly. Problem #5 is that Tor clients aren’t as good as they should be at handling high or variable latency and connection failures. We need better heuristics for clients to automatically shift away from bad circuits, and other tricks for them to dynamically adapt their behavior. Problem #6 is that low-bandwidth users spend too much of their network overhead downloading directory information. We’ve made a serious dent in this problem already, but more work remains here too.

Posted

Da li ovaj forum toleriše upotrebu Tor-a?

Posted

meni je tolerisao. u stvari cek, kako mislis da li tolerise ? impliciras da postoji mogucnost da ne tolerise ? :huh:a52.jpg

Posted

Ne znam, pitam. Koliko znam politika ovog foruma je ranije bila da ne trpi proksije i slične gluposti, koje korisnika ionako neće zaštiti ni od čega, a omogućavaju beskrajna kloniranja.Svi koji koriste Internet treba da budu svesni da korišćenjem postaju javne ličnosti, uvek bilo i ostalo.

Posted

Ne bih da forsiram "svoju temu" no anonimnost (tor, anonymous proxy i sl) ne znači mnogo ako se ne ispoštuju neka osnovna načela bezbednosti na internetu, passwordi, patchovanje os-a i aplikacija, av zaštita, kvalitetno konfigurisanje fw-a, korišćenje https-a...Dalje, treba biti oprezan kod ovih "anonymizera", ako se radi na kompanijskim racunarima.To je uglavnom no-no.A često ta free rešenja znaju biti trojanac, ne u pravom smislu nego mesto gde će neko skupljati vaše podatke.

Posted

To su sve zaštite od bubuljičavih klinaca, od ozbiljnih igrača zaštite nema.

Posted

To sam na onoj temi već rekao.Od gov nema spasa.No, koje su šanse da ćeš biti meta tih igrača?S druge strane statistika kaže, ogromna većina hakerskih upada je izvedena alatima dostupnim na netu i iste su koristile manjkavosti o kojima sam gore pisao.Ništa bubuljičavi klinci koji holivudski sede ispred 5-6 monitora i koriste svoj OS...

Posted (edited)

.

Edited by Dionysos
Posted
Ovo je vec 2 god. staro, ali je zanimljivo na vise nivoa. TOR and DPI in IranThe slow Internet speed in Iran that have experienced from 2009 until now, has a main cause: “ The regime makes use of DPI technology, i.e. Deep Packet Inspection, and traffic analysis, to track and trace the users and their activities. DPI is not just Inspection of the header, It’s Inspection of the contents of the message. In fact, the regime makes use of DPI as well as the fake digital certificates, Cryptanalysis, traffic analysis, etc. for taking the control of the whole encrypted and non-encrypted data flow. Of course the Internet speed in Iran is generally slow, because in 2006 the Ministry of Communications and Information Technology (MCIT) issued an order forbidding ISPs from providing Internet connectivity to homes and public access points that exceeded 128 kb/s (kilobytes/second). But The slow Internet speeds that we speak about, means 1kb/s to 28kb/s! DPI involves inserting equipment into a flow of online data, from emails and Internet phone calls to images and messages on social-networking sites such as Twitter. Every digitized packet of online data is deconstructed, examined for keywords and reconstructed within milliseconds. In Iran’s case, this is done for the entire country at a single choke point. And that’s why the Internet is and was running at such slow speeds in Iran. DPI delays the transmission of online data . In an interview on October 5, 2010, the vice-president of the Communications Infrastructure Co. in Iran said that changes to the Iranian filtering system were coming. And since January 2011, the Khamenei’s government have significantly modified their network monitoring infrastructure. In short, Iranian authorities, for the first time, found a way to identify and block any SSL and encryption connections, included T!O!R connections, and therefore a way to potentially identify dissidents. What they did was vastly upgrade their capability, said the executive director of the T!O!R Project. He added” “The Iranian authorities used DPI to detect the highly specific parameters T!O!R uses to establish an encrypted connection.” But it’s not the whole story. The traffic analysis, that are used to infer something about the message’s content, origin, destination, or meaning even if an eavesdropper is unable to understand the contents of the communication. Traffic analysis can be a powerful technique and is difficult to defend against; it is of particular concern for anonymity systems, where traffic analysis techniques might help identify an anonymous party . Anonymity systems like T!OIR contain some measures intended to reduce the effectiveness of traffic analysis, but might still be vulnerable to it depending on the capabilities of the eavesdropper. And Khamenei’s mercenaries have high capabilities, simply because they have the full support of the western companies. [1,2,3,4,5]The western corporations help the Khamenei’s regime a lot. Nokia Siemens Networks, a joint venture between Germanys Siemens and Finlands Nokia, installed the monitoring equipment in Irans government-controlled telecom network, Telecommunication Infrastructure Co. The equipment allows the state to conduct DPI, which sifts through data as it flows through a network searching for keywords in the content of e-mail and voice transmissions. A spokesman for Nokia Siemens Networks defended the sale of the equipment to Iran suggesting that the company provided the technology with the idea that it would be used for lawful intercept, !!!! such as combating terrorism, drug trafficking, etc. Equipment installed for law enforcement purposes !!!, however, can easily be used for spying as well !!! In fact, the monitoring capability was provided, at least in part, by a joint venture of Siemens AG, and Nokia Corp. in the second half of 2008. The monitoring center that Nokia Siemens Networks sold to Iran was described in a company brochure as allowing “the monitoring and interception of all types of voice and data communication on all networks.” Some experts say: “This looks like a step beyond what any other country is doing, including China.” China’s vaunted “Great Firewall,” which is considered the most advanced and extensive Internet censoring in the world, is believed also to involve DPI. But China appears to be developing this capability in a more decentralized manner, at the level of its ISPs rather than through a single hub. That suggests its implementation might not be as uniform as that in Iran, that all of the country’s international links run through the Telecommunication Infrastructure Co. The stupid T!O!R managers say: “The good thing is that T!O!R is at first an anonymity network, second a circumvention tool. If T!O!R is temporarily blocked, then use a technology that isn’t blocked and run T!O!R over it to protect your traffic from snooping by the lower technology (proxies, etc).” But thesemotherf-u-c-k-e-rs don’t know that the regime has controlled everything, even most of SSL encrypted data, by using of DPI, fake digital certificates, ,Cryptanalysis, traffic analysis, etc. In fact, the regime and its agents have focused on T!O!R, and many other famous privacy tools. It is utterly trivial to block T!O!Rproject.org. But That they don’t do it, because they can monitor who continues to access it, and what they are saying, and who said it. [1,2,3,4,5]The T!O!R Project is funded in part by grants from both the Department of Defense and the State Department. Many countries simply block IP addresses to stop access to the public T!O!R nodes, as well as many T!O!R bridges. But Iran uses DPI and stateful inspection of traffic flows. In fact, They are not merely detecting “SSL or not” but rather able to detect “T!O!R’s SSL or not” and “Gmail’s SSL or not” and “U-l-t-r-a-s-u-r-f’s SSL or not” and handle each individually. They are able to do this for their entirety of Internet traffic in real-time. This ability to snipe traffic is really horrible. The Khamenei’s regime in less than a year has started from scratch, with the help of Nokia and Siemens, and now surpassed the T!O!R project in technical ability. Some Iranians say: “The SSL fingerprinting could be just the beginning. T!O!R traffic sticks out like a sore thumb on the wire in many different ways. T!O!R project team has known this for years, unfortunately their progress in the matter has been hijacked by academics who care more about publishing and their salaries than what they do for the T!O!R users. T!O!R is a ghost of what it could have been. All that’s left is a source of income for paper pushers and code monkeys who cannot innovate and actively work against those who do. T!O!R gets about $500k from the State Dept and everyone bitches at them.” But it is useless for Iranians, and Iranians say: “If the regime can identify encrypted traffic belonging to T!O!R versus other encrypted traffic, that’s a serious problem for Iranians. Not only users can not have access to the T!O!R network, but they’ve broadcast themselves as users of “subversive” technology, ripe for repercussions. In fact, Iranians should be so careful about the classic T!O!R, and should stay far away from T!O!R until this issue is resolved properly. In fact, T!O!R managers don’t care about this matter and we should ask them: Is the fact that T!O!R users can be identified so casually by random governments not considered an important enough issue? ” [1,2,3,4,5]An Iranian says: “I’ve had an unpublished T!O!R bridge node running for a good and would love to be able to advertise it to those needing it, but how? I need an ability to be able to pass my details on to only a very few people. I’ve grown tired with trying to reestablish working bridges these days as they’re always blocked so very quickly as soon as I publish to the T!O!R network. I sincerely appreciate the T!O!R effort, but I feel the people behind it really should start to entertain more radical changes in how the network operates if they truly do wish to create what they say/promise. As it stands now, T!O!R as a network exists only at the behest of controlling governments, a comical position considering its stated goal. ” Another Iranian says: “When money are involved, people turn biased and their work becomes based on the money they can obtain from it. Capitalism is evil. And, many developers don’t want to lose the money once they had the opportunity to get it. So, they are no more independent. They’ll do what they’re told and paid for, rather than what is useful for real. People driven by the money and no more by the love in what they’re doing. I think that if all donations, or at least big donations (I call them “bribes”!) from non-real-persons and companies, were refused by the T!O!R PROJECT it would have some benefits. You’ve the example of Firefox itself, a free and open source software, corrupted by Google. Many of us very dislike the fact that even T!O!R works together with Google for the “summer of code projects”. T!O!R, an open source, and also pro-privacy and anonymization tool is together with the most anti-privacy multinational company ! Why is the “summer of code projects” important?! FOR THE MONEY! for the corruption!” And another Iranian says: “We lost a bit of interest in T!O!R after having had many of our good suggestions rejected because of somebody else jealousy! and we think it was an open source, but now is a too closed project! A group very similar to a clique, manage it. The T!O!RPROJECT shouldn’t work for what donators want. They should work for users’ suggestions and what users want ! ” [1,2,3,4,5]Iranians should not be disappointed. There are still some ways for f-u-c-k-ing the Khamenei’s western technologies. The essential key point is : Don’t use the fairly popular techniques/tools or continue using the same service or method for a long period of time. And the key point for avoiding DPI is: “ Don’t use any dangerous keywords in your emails and other data. “; Don’t use any non-encrypted data; Always check your digital certificates; Use lesser-known browsers that support OCSP feature; Don’t trust your V!P!N totally. Even if you know and trust the person running a single-hop proxy or V!P!N, they may be hacked, or forced to compromise your information. It is dangerous to think that it is possible to have a “one click solution” for anonymity or security. For instance, routing your traffic through a proxy or through Tor is not enough. Be sure to use encryption, keep your computer safe and avoid leaking your identity in the content you post. If your network blocks HTTPS port, you should assume that the network operator can see and record all of your Web browsing activities on the network. Even if your HTTPS port is open, remember that t a sophisticated attacker, like Khamenei’s agents, could trick your browser into not displaying a warning during an attack. This is not a reason to avoid using HTTPS, but you should be very cautious about Digital Certificates and the validation of them. Fighting against the Internet censorship is a constant fight, and we should be updated and search for better tools and methods regularly. And finally we, i.e. many Iranians that live inside Iran and live under the serious threat, should say: “Shame on the US Department of Defense and the US State Department that waste their money in the name of helping Iranians, while Iranians can not see any serious help at all. And shame on the stupid T!O!R project managers that don’t care about the serious T!O!R problems”Resource for further reading:[1]Iran’s Web Spying Aided By Western Technology [2]Iran now actually use DPI [3]T!O!R Project Blog [4]Basij Hack Comodo Certificate[5] Access Controlled

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...