[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Tor as a component of a cohesive anonymizing OS



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In March, I did a presentation on behalf of kaos.theory security research at Interz0ne IV, on building an "Anonym.OS."

The talk discussed the process of hardening and reconfiguring a host to ensure that all externally-initiated communications are dropped or denied, and that all locally-initiated traffic is encrypted and/or anonymized -- optimally both -- from a machine to its final destination.

The idea was to build a portable system that could be introduced to an arbitrary network (hotel broadband, WiFi hotspot, client network, etc.) without leaving any discernible fingerprints or telltale footprints. The talk focused primarily on Linux and BSD systems (incl. Mac OS X), though there was some limited discussion about acomplishing the same goal, to the greatest degree possible, on Windows as well.

Of course, key components in accomplishing this include Tor and Privoxy, so I thought a few folks on the list, who might not have made it to Atlanta for Interz0ne, would be interested in seeing the presentation, now available at the kaos.theory website:

http://theory.kaos.to/projects/AnonymOS.pdf


Cheers, - -- dr.kaos at kaos.to security ninja :: kaos.theory security research, in fractal detail

http://theory.kaos.to

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (Darwin)

iEYEARECAAYFAkJcPfAACgkQKFGf6YjtZRCvaQCgilBpgwCauGiV8HSIIlb3HiIy
1wsAoKJikRcUAavAD9psm87wwWly9rfX
=7lp/
-----END PGP SIGNATURE-----