Cryptome

27 August 2016

Tor hiding IP addresses just 10% good for true anonymity

· · In reply to Tim Shorrock

★ STMAN ★ ‏ @ stmanfr 5 hours ago

@ TimothyS No problem. I am at your disposal in DM or in public, as you prefer, to give you more infos. @ yashalevine @ Cryptomeorg

0 retweets 0 likes

· In reply to ★ STMAN ★

Tim Shorrock ‏ @ TimothyS 5 hours ago

@ stmanfr fascinating. thx. would like to learn more. all the big technos have blocked me bc of Qs we've raised. @ yashalevine @ Cryptomeorg

2 retweets 1 like

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 5 hours ago

@ yashalevine And this was a third confirmation. And I considered your approach of the question as the fourth one. @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 5 hours ago

@ yashalevine two different kinds of workarounds to make TOR really operationnal. Both were ignored, censured, mocked. @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 5 hours ago

@ yashalevine a fully detailed, demonstrated explanation of what I told you earlier. A new attack surface, and even @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 5 hours ago

@ yashalevine You have been bullied because you had no formal proof. You were just suspecting something. I did found @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 5 hours ago

@ yashalevine guess what, I have been censured, ignored, threatened, silenced and persecuted by spies. How funny. @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 5 hours ago

@ yashalevine I had another kind of confirmation, I challenged several TOR team developpers on what I had found, and @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine having a global internet Traffic DPI capability, and the only agency having such powers was NSA. Then @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine having global DPI capabilities on the whole internet traffic, and the only agency with such powers was @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine technics I had discovered, unpatchable by software, by the way, could only be exploited by nations @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine VPN network topologies. I discovered that thanks to the P2P architecture of TOR, some desanomysation @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine becoming more obvious. I had the confirmation by studying the architectural differences between TOR and @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine becoming everyday more obvious. I had the confirmation by studying the consequences of the inner @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine started to become very interesting because the shape of a strategical & tactical secret weapon was @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine consequences of hiding IP addresses the way TOR does it, and the way simple VPN's do it. And here things @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine been to study and list "all what was missing" to achieve true anonymity, and what were the hidden true @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine IP adresses was very clearly a diversion, a lie by omission. But what has been the most interesting has @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine only 10% of what had to be done to achieve true anonymity. Therefore, this restricted focus on hiding @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine anonymous in the current technological context, lead me to understanding that hiding IP adresses was @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine anonumous in such technological context, lead to understanding that hiding IP adresses was just 10% @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine technological context, and asking myself the right questions, like, what is necessary to be fully @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine the global technological context. I did it. And my original approach, taking in account the whole @ TimothyS @ Cryptomeorg

0 retweets 0 likes

· In reply to Yasha Levine

★ STMAN ★ ‏ @ stmanfr 6 hours ago

@ yashalevine Of course you were always right to suspect something, but you never studied the technology of TOR in @ TimothyS @ Cryptomeorg

0 retweets 0 likes