Cryptome

 

27 August 2016

 

Tor hiding IP addresses just 10% good for true anonymity

 

·  ·  In reply to Tim Shorrock

★ STMAN ★@stmanfr 5h5 hours ago

@TimothyS No problem. I am at your disposal in DM or in public, as you prefer, to give you more infos. @yashalevine @Cryptomeorg

0 retweets 0 likes

·  In reply to ★ STMAN ★

Tim Shorrock@TimothyS 5h5 hours ago

@stmanfr fascinating. thx. would like to learn more. all the big technos have blocked me bc of Qs we've raised. @yashalevine @Cryptomeorg

2 retweets 1 like

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 5h5 hours ago

@yashalevine And this was a third confirmation. And I considered your approach of the question as the fourth one. @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 5h5 hours ago

@yashalevine two different kinds of workarounds to make TOR really operationnal. Both were ignored, censured, mocked. @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 5h5 hours ago

@yashalevine a fully detailed, demonstrated explanation of what I told you earlier. A new attack surface, and even @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 5h5 hours ago

@yashalevine You have been bullied because you had no formal proof. You were just suspecting something. I did found @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 5h5 hours ago

@yashalevine guess what, I have been censured, ignored, threatened, silenced and persecuted by spies. How funny. @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 5h5 hours ago

@yashalevine I had another kind of confirmation, I challenged several TOR team developpers on what I had found, and @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine having a global internet Traffic DPI capability, and the only agency having such powers was NSA. Then @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine having global DPI capabilities on the whole internet traffic, and the only agency with such powers was @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine technics I had discovered, unpatchable by software, by the way, could only be exploited by nations @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine VPN network topologies. I discovered that thanks to the P2P architecture of TOR, some desanomysation @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine becoming more obvious. I had the confirmation by studying the architectural differences between TOR and @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine becoming everyday more obvious. I had the confirmation by studying the consequences of the inner @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine started to become very interesting because the shape of a strategical & tactical secret weapon was @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine consequences of hiding IP addresses the way TOR does it, and the way simple VPN's do it. And here things @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine been to study and list "all what was missing" to achieve true anonymity, and what were the hidden true @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine IP adresses was very clearly a diversion, a lie by omission. But what has been the most interesting has @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine only 10% of what had to be done to achieve true anonymity. Therefore, this restricted focus on hiding @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine anonymous in the current technological context, lead me to understanding that hiding IP adresses was @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine anonumous in such technological context, lead to understanding that hiding IP adresses was just 10% @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine technological context, and asking myself the right questions, like, what is necessary to be fully @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine the global technological context. I did it. And my original approach, taking in account the whole @TimothyS @Cryptomeorg

0 retweets 0 likes

·  In reply to Yasha Levine

★ STMAN ★@stmanfr 6h6 hours ago

@yashalevine Of course you were always right to suspect something, but you never studied the technology of TOR in @TimothyS @Cryptomeorg

0 retweets 0 likes