Posted on 11/27/2013 9:12:38 AM PST by Bobalu
The Internets main engineers have asked the architects of Tornetworking software designed to make Web browsing privateto consider turning the technology into an Internet standard.
If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps. This would, in turn, allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic.
If the discussions bear fruit, it could lead to the second major initiative of the Internet Engineering Task Force (IETF) in response to the mass surveillance by the National Security Administration. Already the IETF is working to encrypt more of the data that flows between your computer and the websites you visit
(Excerpt) Read more at technologyreview.com ...
We are speeding headlong toward an internet that no longer has an identifying IP address that points directly back to the users location. We can thank Ed Snowden for this...kudos also to the copyright hounds.
When an Onion routing system attains a certain critical mass it becomes virtually impossible to comprehend the data moving through it. Once there are many millions on the system even traffic analysis is thwarted. The traffic from server to server is highly encrypted and with millions of end-point computers there would be no way to make sense of it at all. And there is the fact that most servers on the net are going to move to perfect-forward-secrecy SSL, this will mean even the final hop out of the Onion router chain will be obscured...and even rubber-hosing the SSL keys from server operators won't allow decryption of recorded traffic.
It's gonna be the end of wholesale gov data snooping...and the end of copyright (for good and/or ill)
Second it.
If the bits make it to your screen, they can be tracked.
Ping for later
True, but the amount of time and work it would take to track them can be made to be astronomical.
Good idea... should have been this way from the start...
what do I want?
privacy , to be left alone especially by governments
I want freedom to be able to buy any product the free market produces and to live my life the way I want to. I don't care what others do , just leave me and the free market alone so that I and others can take advantage of the millions of great products and money making opportunities created by a freer free market ( capitalism)
I'm a Republican
democrat voters love and trust government cause they are brainwashed idiots
I use Tor and a number of other privacy/anonymity tools regularly. However, I’ve found that a lot of people have a hard time understanding what the tools do and how to properly (safely) use them. “Baking” these into the internet would be great.
Perhaps, but the threat model is vastly different if you're worried about TEMPEST attacks rather than the wholesale snooping the government regularly does today. Snooping becomes several orders of magnitude more expensive if they have to resort to such methods.
I dream of the day that any email sent that is not encrypted to a specific sender is dumped into a bit-bucket at the mailserver, in the same way that many mailservers will not accept mail from servers without proper SPF records.
Screw the faggots at the NSA/FBI/CIA
SECOND
lol. The other end of this is a state in which all knowledge is accessible to everyone, and the tracked bits don’t matter.
A whole new world out there.
Yes, the average internet user should not have to educate themselves about anonymity and encryption.
It is up to the large group of technologically sophisticated patriots to create and deliver these important tools.
The tools must be open-source and peer reviewed.
Never trust a closed-source security product.
Sadly, we are now in the era of untrustworthy silicon. We can no longer even trust the integrated circuits in the equipment we buy. :-( They can leak data, weaken random number generation, emit and receive data using rf, look for specific data, store bits of data internally that cannot be wiped...etc
Untrustworthy silicon means that for the most important installations we need air-gaping, rf shielding, and the use of custom processors built using FPGAs. With no way to ensure what data may be stored in silicon, only total physical security of the hardware will suffice.
Wouldn’t this entail all or most users serving as relays for network speed to be satisfactory? If so, would this be compulsory perhaps, or baked into the system so there is no opt out provision? What about concerns that illegal material is passing through one’s network? What about exit nodes? I don’t want to be one, that’s for sure. The scheme seems problematic to me, at first blush anyway.
It would be baked into the system.
Also, the transfer of data between users does not need to depend upon internet exit nodes at all in such a large system.
It would be, in effect, an untraceable version of bit torrent that had no telltale IP address to finger the users.
You can configure TOR to handle bit torrent data now but it is frowned on as it wastes precious bandwidth better used for more important data. However, in a modified TOR system scaled up an order of magnitude torrent data would not be harmful.
Then there is the fact that just a teeny bit of plausible deniability goes a long way, and a lot of it is an insurmountable legal obstacle.
Until the NSA sets up Trojan Proxy Server services.
Or maybe they already have...?
The Internets main engineers have asked the architects of Tornetworking software designed to make Web browsing privateto consider turning the technology into an Internet standard.
"It's gonna be the end of wholesale gov data snooping...and the end of copyright (for good and/or ill)"
The CIA (and other agencies) will infiltrate "Tor" and everyone and thing associated with it will be compromised. Bitcoin too.
If OPSEC, and associated logistics, staffing, harding of facilities, etc. don't happen now, the NSA will still be in business.
Sorry.
5.56mm
Tech bookmark.
Also, the transfer of data between users does
not need to depend upon internet exit nodes at
all in such a large system.
So the notion of an exit node is rendered moot? All destination websites are simply part of the internal tor network?
Then there is the fact that just a teeny bit of
plausible deniability goes a long way, and a lot
of it is an insurmountable legal obstacle.
You are much more sanguine than am I on this matter. I don’t want illegal material passing through my network , period. Maybe I’m paranoid, but so be it. Anyway, thanks for your insights on the matter.
Things that terrify the NSA
-Good random numbers
-Hard encryption as a standard on smart phones.
-Open source baseband firmware adoption
-Perfect Forward Secrecy as SOP on the net
-A hardened TOR network with millions of users
-Wideband rf noise aimed at select points of the Clarke belt.
-Silicon chips that are certified as secure by a trusted body
-Their own employees
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.