Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Group Thinks Anonymity Should Be Baked Into the Internet Itself
MIT Technology Review ^ | November 26, 2013 | David Talbot

Posted on 11/27/2013 9:12:38 AM PST by Bobalu

The Internet’s main engineers have asked the architects of Tor—networking software designed to make Web browsing private—to consider turning the technology into an Internet standard.

If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps. This would, in turn, allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic.

If the discussions bear fruit, it could lead to the second major initiative of the Internet Engineering Task Force (IETF) in response to the mass surveillance by the National Security Administration. Already the IETF is working to encrypt more of the data that flows between your computer and the websites you visit

(Excerpt) Read more at technologyreview.com ...


TOPICS: Constitution/Conservatism; Culture/Society; Government; News/Current Events
KEYWORDS: internet; internetanonymity; internetprivacy; nsa; tor
Navigation: use the links below to view more comments.
first 1-2021-37 next last
Onion Routing grew out of work by the U.S. Naval Research Laboratory aimed at protecting military users...now I bet the government wishes they had never birthed this baby.

We are speeding headlong toward an internet that no longer has an identifying IP address that points directly back to the users location. We can thank Ed Snowden for this...kudos also to the copyright hounds.

When an Onion routing system attains a certain critical mass it becomes virtually impossible to comprehend the data moving through it. Once there are many millions on the system even traffic analysis is thwarted. The traffic from server to server is highly encrypted and with millions of end-point computers there would be no way to make sense of it at all. And there is the fact that most servers on the net are going to move to perfect-forward-secrecy SSL, this will mean even the final hop out of the Onion router chain will be obscured...and even rubber-hosing the SSL keys from server operators won't allow decryption of recorded traffic.

It's gonna be the end of wholesale gov data snooping...and the end of copyright (for good and/or ill)

1 posted on 11/27/2013 9:12:38 AM PST by Bobalu
[ Post Reply | Private Reply | View Replies]

To: Bobalu

Second it.


2 posted on 11/27/2013 9:15:38 AM PST by Biggirl (“Go, do not be afraid, and serve”-Pope Francis)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu

If the bits make it to your screen, they can be tracked.


3 posted on 11/27/2013 9:15:48 AM PST by Yo-Yo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu
When an Onion routing system attains a certain critical mass it becomes virtually impossible to comprehend the data moving through it. Once there are many millions on the system even traffic analysis is thwarted. The traffic from server to server is highly encrypted and with millions of end-point computers there would be no way to make sense of it at all. And there is the fact that most servers on the net are going to move to perfect-forward-secrecy SSL, this will mean even the final hop out of the Onion router chain will be obscured...and even rubber-hosing the SSL keys from server operators won't allow decryption of recorded traffic. It's gonna be the end of wholesale gov data snooping...and the end of copyright (for good and/or ill)

Ping for later

4 posted on 11/27/2013 9:20:02 AM PST by Alex Murphy ("the defacto Leader of the FR Calvinist Protestant Brigades")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

True, but the amount of time and work it would take to track them can be made to be astronomical.


5 posted on 11/27/2013 9:21:14 AM PST by Boogieman
[ Post Reply | Private Reply | To 3 | View Replies]

To: Bobalu

Good idea... should have been this way from the start...


6 posted on 11/27/2013 9:22:54 AM PST by GOPJ ("Remember who the real enemy is... ")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu
Sounds good

what do I want?

privacy , to be left alone especially by governments

I want freedom to be able to buy any product the free market produces and to live my life the way I want to. I don't care what others do , just leave me and the free market alone so that I and others can take advantage of the millions of great products and money making opportunities created by a freer free market ( capitalism)

I'm a Republican

democrat voters love and trust government cause they are brainwashed idiots

7 posted on 11/27/2013 9:27:15 AM PST by Democrat_media (Obama ordered IRS to rig 2012 election and must resign)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu

I use Tor and a number of other privacy/anonymity tools regularly. However, I’ve found that a lot of people have a hard time understanding what the tools do and how to properly (safely) use them. “Baking” these into the internet would be great.


8 posted on 11/27/2013 9:28:54 AM PST by NewHampshireDuo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu; rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; ...

9 posted on 11/27/2013 9:31:58 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo
If the bits make it to your screen, they can be tracked.

Perhaps, but the threat model is vastly different if you're worried about TEMPEST attacks rather than the wholesale snooping the government regularly does today. Snooping becomes several orders of magnitude more expensive if they have to resort to such methods.

I dream of the day that any email sent that is not encrypted to a specific sender is dumped into a bit-bucket at the mailserver, in the same way that many mailservers will not accept mail from servers without proper SPF records.

Screw the faggots at the NSA/FBI/CIA

10 posted on 11/27/2013 9:39:33 AM PST by zeugma (Is it evil of me to teach my bird to say "here kitty, kitty"?)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Bobalu

SECOND


11 posted on 11/27/2013 10:04:45 AM PST by Viennacon
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yo-Yo

lol. The other end of this is a state in which all knowledge is accessible to everyone, and the tracked bits don’t matter.

A whole new world out there.


12 posted on 11/27/2013 10:15:12 AM PST by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 3 | View Replies]

To: NewHampshireDuo

Yes, the average internet user should not have to educate themselves about anonymity and encryption.

It is up to the large group of technologically sophisticated patriots to create and deliver these important tools.

The tools must be open-source and peer reviewed.

Never trust a closed-source security product.

Sadly, we are now in the era of untrustworthy silicon. We can no longer even trust the integrated circuits in the equipment we buy. :-( They can leak data, weaken random number generation, emit and receive data using rf, look for specific data, store bits of data internally that cannot be wiped...etc

Untrustworthy silicon means that for the most important installations we need air-gaping, rf shielding, and the use of custom processors built using FPGAs. With no way to ensure what data may be stored in silicon, only total physical security of the hardware will suffice.


13 posted on 11/27/2013 10:22:13 AM PST by Bobalu (White Boy Think A Lot)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Bobalu

Wouldn’t this entail all or most users serving as relays for network speed to be satisfactory? If so, would this be compulsory perhaps, or baked into the system so there is no opt out provision? What about concerns that illegal material is passing through one’s network? What about exit nodes? I don’t want to be one, that’s for sure. The scheme seems problematic to me, at first blush anyway.


14 posted on 11/27/2013 11:02:08 AM PST by pluvmantelo (Islam-No stronger retrograde force exists in the world.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pluvmantelo

It would be baked into the system.

Also, the transfer of data between users does not need to depend upon internet exit nodes at all in such a large system.

It would be, in effect, an untraceable version of bit torrent that had no telltale IP address to finger the users.

You can configure TOR to handle bit torrent data now but it is frowned on as it wastes precious bandwidth better used for more important data. However, in a modified TOR system scaled up an order of magnitude torrent data would not be harmful.

Then there is the fact that just a teeny bit of plausible deniability goes a long way, and a lot of it is an insurmountable legal obstacle.


15 posted on 11/27/2013 11:23:17 AM PST by Bobalu (White Boy Think A Lot)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Boogieman
True, but the amount of time and work it would take to track them can be made to be astronomical.

Until the NSA sets up Trojan Proxy Server services.

Or maybe they already have...?

16 posted on 11/27/2013 11:29:26 AM PST by Yo-Yo
[ Post Reply | Private Reply | To 5 | View Replies]

To: Bobalu
Good afternoon.

The Internet’s main engineers have asked the architects of Tor—networking software designed to make Web browsing private—to consider turning the technology into an Internet standard.

"It's gonna be the end of wholesale gov data snooping...and the end of copyright (for good and/or ill)"

The CIA (and other agencies) will infiltrate "Tor" and everyone and thing associated with it will be compromised. Bitcoin too.

If OPSEC, and associated logistics, staffing, harding of facilities, etc. don't happen now, the NSA will still be in business.

Sorry.

5.56mm

17 posted on 11/27/2013 11:32:26 AM PST by M Kehoe
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu

Tech bookmark.


18 posted on 11/27/2013 11:38:43 AM PST by Sergio (An object at rest cannot be stopped! - The Evil Midnight Bomber What Bombs at Midnight)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu

Also, the transfer of data between users does
not need to depend upon internet exit nodes at
all in such a large system.

So the notion of an exit node is rendered moot? All destination websites are simply part of the internal tor network?

Then there is the fact that just a teeny bit of
plausible deniability goes a long way, and a lot
of it is an insurmountable legal obstacle.

You are much more sanguine than am I on this matter. I don’t want illegal material passing through my network , period. Maybe I’m paranoid, but so be it. Anyway, thanks for your insights on the matter.


19 posted on 11/27/2013 11:50:57 AM PST by pluvmantelo (Islam-No stronger retrograde force exists in the world.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: M Kehoe

Things that terrify the NSA

-Good random numbers
-Hard encryption as a standard on smart phones.
-Open source baseband firmware adoption
-Perfect Forward Secrecy as SOP on the net
-A hardened TOR network with millions of users
-Wideband rf noise aimed at select points of the Clarke belt.
-Silicon chips that are certified as secure by a trusted body
-Their own employees


20 posted on 11/27/2013 11:55:34 AM PST by Bobalu (White Boy Think A Lot)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-37 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson