Tor as a component of a cohesive anonymizing OS

dr.kaos at kaos.to dr.kaos at kaos.to
Tue Apr 12 21:30:19 UTC 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In March, I did a presentation on behalf of kaos.theory security 
research at Interz0ne IV, on building an "Anonym.OS."

The talk discussed the process of hardening and reconfiguring a host to 
ensure that all externally-initiated communications are dropped or 
denied, and that all locally-initiated traffic is encrypted and/or 
anonymized -- optimally both -- from a machine to its final 
destination.

The idea was to build a portable system that could be introduced to an 
arbitrary network (hotel broadband, WiFi hotspot, client network, etc.) 
without leaving any discernible fingerprints or telltale footprints. 
The talk focused primarily on Linux and BSD systems (incl. Mac OS X), 
though there was some limited discussion about acomplishing the same 
goal, to the greatest degree possible, on Windows as well.

Of course, key components in accomplishing this include Tor and 
Privoxy, so I thought a few folks on the list, who might not have made 
it to Atlanta for Interz0ne, would be interested in seeing the 
presentation, now available at the kaos.theory website:

http://theory.kaos.to/projects/AnonymOS.pdf


Cheers,
- --
dr.kaos at kaos.to
security ninja :: kaos.theory
security research, in fractal detail

http://theory.kaos.to

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (Darwin)

iEYEARECAAYFAkJcPfAACgkQKFGf6YjtZRCvaQCgilBpgwCauGiV8HSIIlb3HiIy
1wsAoKJikRcUAavAD9psm87wwWly9rfX
=7lp/
-----END PGP SIGNATURE-----



More information about the tor-talk mailing list