[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Will Tor affect Internet Explorer? (newbie question)



15.07.2013 11:57, Gabrielle DiFonzo:
> 
> Aha. This message explained a lot to me. Thank you for the detail on PDFs. It was very clear to me.
> 
> As for, say, iTunes, so what you're saying is that it's not a good idea to have programs like that running at the exact same time that you're online with Tor?
> 

I don't know what iTunes provides, beside browsing for music and
listening to it. 'Steam', (iTunes for video games :) ) for example has a
friends list so they see when you are Online. (Don't know if that is
optional)

Best avoid are programs and actions that are observable by the general
public or an adversary depending on your threat model.

Bittorrent for example is something where anybody can potentially learn
your IP address if he/she downloads files you have available (regardless
of the files).

Public forums where people see that you are Online or you post there
while not using Tor, for example using IE to post at
forum.cats.example.com (A) and you use Tor (TBB) to participate in
forum.dogs.catssuck.com (B) at the same time. Users of A could be
interested in what their enemies do and visit B. Being low volume
forums, they may notice that you make posts at A and posts at B, where
they only know for sure that you have contributed to A, but due to the
fact that an (to them) anonymous user always posted something to B while
you where Online at A, they could correlate those identities.

iTunes might not have been a great example, but something that runs in
the background and connects to the Internet can be potential harmful.

Best,
bastik

> -----Original Message-----
> From: Sebastian G. <bastik.tor> <bastik.tor@xxxxxxxxxxxxxx>
> To: tor-talk <tor-talk@xxxxxxxxxxxxxxxxxxxx>
> Sent: Mon, Jul 15, 2013 3:55 am
> Subject: Re: [tor-talk] Will Tor affect Internet Explorer? (newbie question)
> 
> 
> 15.07.2013 08:39, Gabrielle DiFonzo:
>>
>> What do you mean by "phone home"?
> 
> When you download a PDF document over Tor you get the properties you
> expect from Tor (e.g. being anonymous to the server hosting the PDF). If
> you then open the PDF document, while still being Online, with Adobe
> Acrobat Reader (or any other reader), while not having the reader
> configured to use Tor it could be the case that the PDF document
> contains a resource that is located on a server (maybe the server you
> downloaded it from, maybe another) and Tor gets bypassed.
> 
> The server logs show someone downloads 'cryptonite.pdf' and the IP
> address tells the server operator that it belongs to a Tor Exit (public
> information). Ten seconds later the server logs show a request for a
> picture embedded in above PDF document, this time with another IP
> address, which is ultimately yours. The server operator can tell that
> the IP address does not belong to Tor and conclude it is yours.
> 
> This broke your anonymity.
> 
> This can affect a lot of files. I can affect PDFs, but you can't tell if
> it is safe or not. Word documents can contain external resources as
> well. WMA and WMV (WindowsMediaAudio) (WindowsMediaVideo) can contain
> DRM information which are checked against a server. I'm not sure if this
> applies to MP3s, but I guess that this is possible.
> 
> For whatever you download over Tor and open while being Online you face
> the risk of your anonymity being broken.
> 
> 
>> All I really save to disk is my photos (from my phone), some PDFs,
>> some MP3s (iTunes) and stuff I write offline in MS Word. Is that a
>> bad idea? If so, why?
> 
> Files that are present because you create them or downloaded them
> without Tor are not safe to upload somewhere as they could contain
> information about you.
> 
> For opening them while using Tor you could face identity correlations.
> 
> Let's say you like music and think it's cool to listen to while blogging
> anonymously with TBB. If iTunes checks license information during
> playback without routing it through the Tor network and you create a new
> blog post during that time over Tor, someone might be able to correlate
> the identities. (Or assume a forum you participate in pseudonymous, as
> it allows more fine grained timing information)
> 
> Your ISP for instance would know that you are connected to the Tor
> network, but not what you do there, and he knows about the connection to
> iTunes.
> 
> Best,
> bastik
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
>  
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 

_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk