Switch Theme:

Researchers make bittorrent anonymous and impossible to shut down  [RSS] Share on facebook Share on Twitter Submit to Reddit
»
Author Message
Advert


Forum adverts like this one are shown to any user who is not logged in. Join us by filling out a tiny 3 field form and you will get your own, free, dakka user account which gives a good range of benefits to you:
  • No adverts like this in the forums anymore.
  • Times and dates in your local timezone.
  • Full tracking of what you have read so you can skip to your first unread post, easily see what has changed since you last logged in, and easily see what is new at a glance.
  • Email notifications for threads you want to watch closely.
  • Being a part of the oldest wargaming community on the net.
If you are already a member then feel free to login now.




Made in us
Kid_Kyoto






Probably work

Personally, it smells like a honeypot to me. There's also much speculation to whether Tor itself is also one.

 Jimsolo wrote:
It's a victory for criminals everywhere! Yay!


As someone who earns a livelihood from copyright encumbered software, I still emphatically must say: Oh, stop that.

Made in us
Kid_Kyoto






Probably work

 Ouze wrote:

I don't believe Tor is actually anonymous, but it's certainly not a honeypot either. If it were, the FBI wouldn't have to exploit flash vulnerabilities to get IP addresses.


Well, I'm no subject matter expert on it, personally, so I don't really know as I have much of an opinion outside of detail-light articles I've read, but I think it wouldn't strain credibility to suggest that, were it a honeypot, whichever organization responsible wouldn't want to let the cat out of the bag on it any sooner than they could avoid if some other method would get the job done.
Made in us
Kid_Kyoto






Probably work

 Albatross wrote:

It is though. Or, rather, that's one of the things it is. It's other things too, but the point deserves to be made. Correct me if I'm wrong but wouldn't this be a pretty tremendous boon for online paedophile rings wishing to exchange material?


My argument is that people who infringe on a person's copyright are not necessarily breaking criminal code. To blanketly suggest otherwise is unfair.

To your paedophile comment, to a particular extreme, the same could be said about opaque walls. Biggest difference is that they're not new tech.

On a more serious note, I find the claims of the software a little magical. I cannot think of a way that a significantly powerful enough governing body could not be able to shut down said traffic, even if they could not intercept and target individual users, and given enough resources, I think that even that would be possible. I've not done a full audit of the code. I'm honestly probably not qualified. I wish there was something describing technically how this worked that was somewhere between the crap article and trying to tear apart the code itself.

From what little I can glean, I feel like they still don't solve the "trust" issue. Even if you know your distributed network is 100% secure, how do you know all nodes are 100% secure? Most of their magic appears to be based around the idea that the more peer nodes you insert between you and what you're trying to get at, the less everyone immediately knows about what any one person is doing. That alone makes sense, but these nodes aren't restricted to just handling this data. What happens when parties (Microsoft/NSA/SIS) start listening in at a node through a different attack vector? Probably nothing. What happens when they do it to a number of nodes several orders of magnitude greater? Well, then you route murky stuff through five proxies, but when all five of those proxies are compromised, things become much less murky. You almost need a dedicated OS and a computer that uses nothing but this network, and even then, you need hardware you can 100% trust to not have anything malicious burned into an IC somewhere. And before it gets to that point, if the traffic actually looks like anything other than straight-up HTTP/HTTPS traffic to anything looking at it at an ISP, the whole network can likely be shut down completely within days.

I don't do criminal things with computers, but if I did and they required people shifting files around, either sneaker-net or an anonymous wireless network with attached hard drive would be the way to go. 2600 had a fun story a couple issues ago about setting up a raspberry pi some place public in a hard to find location with a couple wireless cards, and then using that as a proxy to do questionable things. That'd be a better start than using anything located in your home.

Network security is a rabbit hole of paranoia and fear, and if someone powerful enough wants you, odds are they'll find a way.
Made in us
Kid_Kyoto






Probably work

Verviedi wrote:
Huzzah! College researchers/students being absolute morons again!


In spite of it, Dakka's not all bad though.
 
Forum Index » Off-Topic Forum
Go to: