Cryptographers Warned against Logging inAdded: Sunday, March 31st, 2013
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extratorrent.com
One of the best American cryptographers has recently warned that one’s broadband connection might be grassing them up to anyone having access to a database.
According to Bruce Schneier, the author of the book “Beyond Fear: Thinking Sensibly About Security in an Uncertain World”, the rapid development of the security industry allows anyone to work out what you are doing without having to directly tap your phone.
Bruce Schneier, when writing for CNN, has cited the cases where advanced computer users could be identified because the FBI managed to correlate data from various sources and make conclusions.
The case was that of Paula Broadwell, who appeared embroiled in an affair scandal with the former CIA director David Petraeus. Paula was cautious enough to never log in to her anonymous e-mail service from her home network, but it didn’t save her. Although she only used public networks like that in hotels and cafes when she e-mailed him, the FBI managed to correlate hotel registration information from various hotels and found the common name.
Bruce Schneier explains that everything we do now involves online data which is saved and can easily be correlated. In fact, there are huge data companies out there, making money by building up intimate profiles of citizens’ lives from many different places. In other words, the worldwide web turned into a surveillance tool which is hard to avoid. According to experts, no measures used to prevent this, including searching from mobiles rather than computers or using an alias on Facebook, can bring any results. The matter is that there are just too many ways to be tracked on the Internet to be able to effectively cover your tracks.
March 31st,2013Posted by:
Sunday, March 31st, 2013
|posted by (2013-04-01 00:25:26)|
|Encrypt everything. Identify nothing.|
|I wonder if they would have been caught if they had used snail mail and pay phones to set up their dates... Hmmm... Probably caught eventually, sure, but by human error, not a digital catalog of info on you.|
If you want to increase anonymity, go offline.
We use to live lives just fine before internet.
|@trialNerror "We use to live lives just fine before internet." well said...true story|
|We also used to live our lives before cars and electricity. Try doing that now.|
|Thanks for the article Sam. I used to be paranoid now I very paranoid. When I was in grad school a professor who happened to be a good friend caught me up to what was out there as far as comps. It was around 91 or 92 I believe and it either pre-dated or was before window as we know it. I remember him showing me a computer screen which showed what seemed like a TV after the station went off the air. What he said was "this is the world wide web" Now this was 20 some years ago and a lot of hoochie. If I remember this right an occasional picture would come into focus but I never thought much about it except how much money I would have if I would have pursued it. But we did at the time have a long conversation mostly him but he talked about all the wonder of the possibility of being able to connect to people all over the world and the opportunities it could bring and so on. Now this guy taught law and knew a little about a lot about what he called the game of the upper echelon of government? Then as we talked he talked about all the freedoms that could be lost and tracking by people we don't want tracking us. Now I don't know if it was the hooch but that's when I started getting a case of the noids. I also had an in-law that was a very anti government professor at Hamlin College in Minny that told me about all sorts of cr.. about missles and how at any moment puff! we would be wiped out|
|Sorry I just wanted to add a couple words but comp is junk anyway my in-laws ravings is what started the whole thing when I was 16 or so and that was definitely the hooch. Funny thing is I haven't touched the hooch in around 17-18 years. It's funny how you can read a truthful article about something you heard 20 years ago, and didn't seriously believe. Sorry about the length and the spelling. was just wondering about the time frame|
|posted by (2013-04-02 07:56:37)|
|That was an interesting read, I read a paper like 10 yrs ago about digitalising everything and price we will pay. Problem is, guys who do it don't have a life. most of the time they are locked up in their labs. Even if they do enjoy life, they are paid very well. So they don't give a BS about what it could do to rest of the world.|
|posted by (2013-04-02 15:20:43)|
|While you can never be safe -- warning to drug dealers and Al Qaeda operatives -- you can make yourselves safe enough that minor issues of privacy are not worth anyone going after. Paula and David and Bill and Monica did not adopt protocols that were "safe enough." If nothing else, use Hushmail exclusively -- but be aware that even the Phil-Zimmerman-approved-Hushmail can and has been compromised, and it wouldn't be good enough for anyone of the visibility of Bill or David with enemies of presumable skill to easily slice through those protections (and by that I mean the legal, authoritative means to coerce Hushmail).|
The next level is that both parties must adopt and then faithfully use PGP, or better yet, the German government sponsored freeware GPG ("OpenPGP standard" equivalent).
Still, exchanging PGP messages *may* deny the casual attacker knowledge of what was said but it is still easy to determine that (1) Bill and Monica exchanged emails on such-and-such a date and time, and that (2) the emails were about of a certain size. Traffic analysis! Defeat 90% of this by using the simple shareware program Quicksilvermail Lite by Richard Christman. The attacker will know Paula sent a message of a certain size at a certain time and that David received a similar message a little while later -- but the attacker cannot conclusively put the two together. However, if the two are known to communicate the inference is obvious. Thus even this is not perfect. The newspaper article could persuasively describe this as a pattern of communication that suggests a relationship.
Confetti! For every real message, send two or three nonsense messages that are at least plausible! Wikipedia articles on the native fauna of Afghanistan; running paths in Virginia. Makes the bad guys' job harder but not yet impossible.
Bear in mind that every computer has board level hardware that is or might be compromised from the outset. Barracuda servers? Backdoored! Intel’s Intelligent Platform Management Interface IMPI & Dan Farmer: Backdoored, possibly everything! If not snail-mail then at least carving rocks and delivering by throwing might be better.
Last: remember that "If you don't buy this magazine, we'll kill this dog!" (Google image that expression: it's a National Lampoon cover). "They" can always get to you even if all they have to do is bypass their computer and go right to the wetware source.
Stay thirsty, my friends.
|most would not even press the power button if they realised just who was watching them,we live in an age whereby everyone from your ISP to Microsoft can get access to you one way or another most by their cable companies designated IP address others through your O/S and since Iraq all have given access with a few exceptions when the request has come from the appropriate channels using the Patriot act or Anti-terrorism gracie,officially the internet is still free, unofficially for the last 13 years the NSA and CIA`s main directive has been to take a lead in the control of the Internet (google CIA white papers from 2000 and global cyber strategy)to live in a paranoid world without a little paranoia is a mistake 74 Microsoft fusion centres and the other agencies all scratching at the door if on their list or doing anything they have an agenda to stop best you be doing it on the move using a burner phone or device not registered to you using open wifi router not owned by yourself.||
Most Popular Stories