[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor and Google error / CAPTCHAs.
On 1 October 2016 at 16:10, <blobby@xxxxxxxxxxxxxxx> wrote:
> I didn't explain myself very well. With the proxychains tool (
> http://proxychains.sourceforge.net/) you can write something like:
>
[...deletia...]
So:
- person uses tor to connect to socks proxy provider
- person authenticates (?) to socks proxy provider
- person traverses socks proxy prover to connect to end service
This sound like putting a condom on top of another condom after cutting a
hole in the first one, but hey, if you think it's worthwhile and fun, knock
yourself out. :-)
The problem is that the SOCKS IP itself may be "bad" (perhaps even as "bad"
> as an exit node IP) and hence Gmail, FB, etc, still discriminate (and hence
> demand additional proof).
>
Also that. Basically you are just shifting (say) Google's knowledge of
what IP address from
"possibly a Tor user, amongst all the spam that Tor emanates"
to:
"traffic sourced from some shitty open (or authenticated?) random SOCKS
relay, who know what the fuck this is?"
In short, you're making <COMPANY'S> job of picking out good traffic from
bad, _way_ harder.
But, hey, maybe you're masochistic / sadistic / both? :-)
Since SOCKS IPs, like exit node IPs, can be selected by country and
> (sometimes) via city, it's possible to have an IP which is in the city in
> which the webmail or social network person resides.
>
Geolocation is not the only the only fruit, in the authentication fruit
salad; I even alluded to this in the original blogpost ("...appears to be
connecting from Australia at one moment may the next appear to be in Sweden
or Canada") - but with this comes the realisation that geolocation can be
faked to appear normal, too.
-a
--
http://dropsafe.crypticide.com/aboutalecm
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk