[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Free WiFi Bootable Ditros

--- On Tue, 7/31/12, Katya Titov <kattitov@xxxxxxxxxx> wrote:

> From: Katya Titov <kattitov@xxxxxxxxxx>
> Subject: Re: [tor-talk] Free WiFi Bootable Ditros
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Date: Tuesday, July 31, 2012, 5:06 AM
> jed c:
> > I wouldn't recommend TOR for anything personally
> identifying
> > (anything done on TOR has a chance of greater scrutiny
> and malicious
> > subversion).
> Agree with that, however just because I'm using Facebook
> doesn't mean I
> will be identifying myself ... ;-)

That might be possible (not identifying yourself). But a few risks may remain. Consider the following: Have you ever used facebook before? Do you or have you talked in the past (FB email chat) with the people you are planning to communicate with? Do these people have any particularly identifying ideology?
Here is the problem I see with facebook. You have a biometric characteristic to the way you type. This can narrow the probability of who you are say to 1 in 25,000. The same can be said for the people you talk to. If you have previously communicated on facebook there is likely a signature there. There are millions on facebook but each additional person you friend is going to narrow down the possible network. If you friend a previous friend on facebook now the combined signature is more unique. The ideology part ties into the topics and words that people use which is also identifying. If you have the advantage of communicating in a different language and alphabet I'd recommend it.

> > Have used Facebook through TOR with SSL enabled and
> watched a friends
> > computer get exploited during a chat session. SSL is
> pretty well
> > broken from my point of view.
> I've seen a single SSL MITM, but that's it. I'm not a fan of
> SSL and see
> major issues, but I think it's far from broken.
> > I wouldnt trust TOR for any executable download or
> software update
> > (pdfs and other exploited forms of media are
> questionable too). Best
> > use for tor is in a read only environment where no
> writable media is
> > present on your computer. I would recommend locking
> your bios, it
> > might not matter if there is a default secondary
> password.
> I'm not sure that I'm quite that paranoid, but Tails can
> certainly
> provide a read-only environment.
> Tails may not be designed for open WiFi networks, but until
> something
> else comes along it may be the best solution for my needs.
> -- 
> kat
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
tor-talk mailing list