TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Tor best practices

93 点作者 triberian超过 11 年前

11 条评论

michaelt超过 11 年前
Or you can read this in its original form, as a StackOverflow answer: <a href="http://security.stackexchange.com/questions/43369/best-practices-for-tor-use-in-light-of-released-nsa-slides/43485#43485" rel="nofollow">http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;43369&#x2F;best-pract...</a>
SamReidHughes超过 11 年前
An element of bad advice in this is the recommendation that you leave your cell phone turned on at home during your activities.<p>If &quot;the feds&quot; considered the possibility that this pattern of Tor activity in various wifi networks around the area all correlate to one person, they could then correlate the set of Tor uses with cell phones that sit motionless during those activities. This will completely out you unless you leave the cell phone in the same location <i>all the time</i> or for extremely large portions of time (a (1 - O(1&#x2F;n))-sized proportion of your time) where n is the number of Tor sessions you want to perform. That&#x27;s a bit pessimistic -- you could improve things by scheduling your Tor activity at times you would never be moving your cell phone anyway, and at times other people would consistently never be moving theirs -- a certain hour of the day. For example, suppose you never move your cell phone between 5 and 6 AM -- that&#x27;s just a pattern in your life, and a pattern in others&#x27; lives, and if you scheduled your activity in that hour, you&#x27;d leak information much more slowly. But eventually, as more and more active cell phone users have the occasion to use their phone in the wee hours, it&#x27;ll leak.<p>You also need to treat your personal internet activity and also perhaps electricity consumption (depending on metering technology) the same way as cell phone activity in this regard. You can&#x27;t be going out using Tor at 5-6 AM some days and then be home browsing YouTube at 5-6 AM a small-ish proportion of the other days -- they&#x27;ll nab you with 99.9999999% certainty in no time.<p>Edit: And you can&#x27;t even be tired, or energetic, or have any measurable change in social activity before or after the Tor session either, of course.
mihok超过 11 年前
I don&#x27;t think the article mentions it, but in addition to the tips in the article, stay away from wireless or bluetooth connections, remove the card(s) if possible... While it might seem tin foil hat, any over-the-air communication is fairly trackable (not saying wired isn&#x27;t). And while your computer or device tries to connect to a network, The control packets sent out to channel 0 will even send a list of preferred networks you&#x27;ve connected to in the past...
评论 #6920839 未加载
评论 #6920840 未加载
评论 #6920897 未加载
middleclick超过 11 年前
I really don&#x27;t understand any of the points in &quot;Your Environment&quot;.<p>&gt; Never use Tor from home, or near home. Never work on anything sensitive enough to require Tor from home, even if you remain offline. Computers have a funny habit of liking to be connected…<p>How exactly? The entire point of Tor is that such stuff should not matter since the first node doesn&#x27;t know what you have requested.<p>&gt; And while the jackboots are very unlikely to show up the same day you fire up Tor at Starbucks, they might show up the next day. I<p>Yeah, no. Wait, what?<p>&gt; I recommend for the truly concerned to never use Tor more than 24 hours at any single physical location; after that, consider it burned and go elsewhere.<p>No?
评论 #6920828 未加载
dobbsbob超过 11 年前
Don&#x27;t really like Whonix, a bunch of VMs stacked on each other for critical isolation. I&#x27;d rather use a hardware firewall box running openbsd or portal by thegrugq. What kind of RNG is being handed out by the Tor daemon Whonix VM that has no human interaction too.
dictum超过 11 年前
There are too many third party requests&#x2F;tracking scripts (Google Adsense, Analytics, webfonts; icon font from bootstrapcdn.com; Twitter avatars) in this blog.<p>The blog itself is hosted in Wordpress.com. I don&#x27;t if this is good or bad for visitors&#x27; privacy, but it feels bad.<p>(I know this kind of comment — X advocates Y but does Z, where Z != Y — is often annoying and shortsighted. That said, hypocrisy, even when it&#x27;s unintended, reduces your authoritativeness.)
belorn超过 11 年前
While reading advice like those in the article, they seem to always leave out the most central aspect of security - the threat model. Doing some guessing, the following threats are mitigated by the article:<p>• An attacker has access to zero-day vulnerabilities to the software running on your device¹.<p>• You are storing non-Tor files on your device that can be used to build a profile against you. That or you are running OSX².<p>• That Flash and Java are horrible messes of software, and will break your security³.<p>• That Online tracking of your anonymous activities can later be used to connect your real identity with an anonymous session of tor usage. Deanonymization is a big research area but with rather little known results in the real world. Search data, social network profiles and large written texts have all been subject of deanonymization research.<p>• That Correlation attacks are practical if an attacker knows the entry node traffic and the exit node traffic. This is also a hot research subject, and the threat model can be created by for example reading the linked research on the tor blog⁴.<p>• Mixing you real identity with anonymous identity can cause harm.<p>• If you rent time at virtual hardware, the real hardware owners can see everything you do.<p>• An attack, presented in a 2013 research paper⁵, to verify if a hidden service is using a guard node owned by the attacker. It then assumes that a hidden service will randomly pick at least one of of 23 tor nodes with a probability of 90% if run under a period of 8 months for the cost of 60 USD per node per month.<p>I could not guess a threat model for &quot;Your workstation must be a laptop&quot;. As a last line of defense, my workstation hard drive is equally easy to destroy with a hammer as my laptop. The cell phone advice is also quite bad - see SamReidHughes comment.<p>1: <a href="http://security.stackexchange.com/questions/40072/could-someone-explain-parts-of-the-fbis-firefox-0-day" rel="nofollow">http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;40072&#x2F;could-some...</a><p>2: <a href="https://research.torproject.org/techreports/tbb-forensic-analysis-2013-06-28.pdf" rel="nofollow">https:&#x2F;&#x2F;research.torproject.org&#x2F;techreports&#x2F;tbb-forensic-ana...</a><p>3: <a href="https://www.torproject.org/docs/faq.html.en#UseTorWithJava" rel="nofollow">https:&#x2F;&#x2F;www.torproject.org&#x2F;docs&#x2F;faq.html.en#UseTorWithJava</a> and <a href="https://www.torproject.org/docs/faq.html.en#TBBFlash" rel="nofollow">https:&#x2F;&#x2F;www.torproject.org&#x2F;docs&#x2F;faq.html.en#TBBFlash</a><p>4: <a href="https://blog.torproject.org/category/tags/entry-guards" rel="nofollow">https:&#x2F;&#x2F;blog.torproject.org&#x2F;category&#x2F;tags&#x2F;entry-guards</a><p>5: <a href="http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf" rel="nofollow">http:&#x2F;&#x2F;www.ieee-security.org&#x2F;TC&#x2F;SP2013&#x2F;papers&#x2F;4977a080.pdf</a>
评论 #6922321 未加载
评论 #6921856 未加载
评论 #6922024 未加载
rocketeerbkw超过 11 年前
&gt; Never insert its battery or turn it on if you are within 10 miles (16 km) of your home...<p>wouldn&#x27;t that leave a huge hole which stands out in a map of prev locations?
dandare超过 11 年前
Why do they sat that rubber hosing is legal in UK? Did I miss something?
blahbl4hblahtoo超过 11 年前
&quot;1. don&#x27;t use windows&quot;...I realize how unpopular it is to question the groupthink on this site but this strikes me as simplistic. The public takedowns related to tor have been more about firefox than windows. But I get that Linux fans like to think that this is their sole bailiwick.<p>If you are using tor and you are using a web browser as your primary means of communication AND YOU REQUIRE SAFTEY you have already made a serious mistake.<p>Using a JSON or XML based API would be much safer since you aren&#x27;t having to trust any level of javascript, css, or html...fetching executable code over the internet from a third party is the ROOT of the problem.<p>It all comes down to what you are trying to do...why are you using tor? who is your adversary?<p>Just using tails or whonix and being super paranoid...because security...is kind of a shit lifestyle decision. It can also lead to a false sense of security.
评论 #6921109 未加载
评论 #6921645 未加载
tux超过 11 年前
It looks like author of this article is doing some shady shit. Using TOR and moving so much in different locations O_o Seems like his very paranoid. I think he forgot about &quot;Faraday cage&quot;.
评论 #6921063 未加载
评论 #6921108 未加载