[tor-bugs] #18034 [Tor]: the five manipulation eyes (theoretical anonymity enhancement)

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jan 11 22:26:02 UTC 2016


#18034: the five manipulation eyes (theoretical anonymity enhancement)
-----------------------------+------------------------------
     Reporter:  bo0od        |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  Medium       |  Milestone:
    Component:  Tor          |    Version:  Tor: unspecified
     Severity:  Normal       |   Keywords:
Actual Points:               |  Parent ID:
       Points:               |    Sponsor:
-----------------------------+------------------------------
 Note:- maybe you need to have knowledge about Qubes or multiple isolated
 VM concept to get what i mean (but not necessarily).

 i was thinking of a theoretical protection against the ISP sniffing or
 reduce the attacking threat of the ISP to my connection. so i have an idea
 but i dont know if its going to work , but here it is:-

 the idea needs Qubes OS , TorVM and/or Whonix


 if we can have more than one Tor connection on a different VMs inside
 Qubes let say five , which r all opened together at the same time or
 gradually (1 then 2 then 3 ...) and including my connection among one of
 them. in another word:-

 1- Tor VM (not mine)
 2- Tor VM (not mine)
 3- Tor VM (my connection)
 4- Tor VM (not mine)
 5- Tor VM (not mine)

 wouldnt that increase our anonymity by increasing the surface of
 connectors/connection points to Tor? (which for sure one of these
 connections r my real connection but i dont have one connection only ,
 instead i have five and im only using one).

 to make this more efficient to use theory:-

 1- the manipulated virtualmachines are not in a true storage , but they
 only need a fixed storage which mean we need only a disposable non-
 persistent storage (amnesic VM and Qubes provide this type of VM).

 2- these manipulated virtualmachines WONT be useable by human. they are
 there just for the sake of its purpose. which will give us the opportunity
 to put these virtualmachines in the lowest consuming resources (RAM ,
 Processor ...etc) so no files or media players or ...etc (so even low
 storage).

 3- to harden these virtualmachines we can make the design of whonix as a
 mini-whonixes to be used from these VMs:-

 Note:- we can use this design in case that just opening Tor wont
 manipulate anything , but if we open Tor + TBB and surfing X or Y website
 then we will have this method/theory to work.

 (X , Y , Z ,V = just random websites.)

 1- GW (Tor) - WS (TBB + X website) (disposable VM)
 2- GW (Tor) - WS (TBB + Y website) (disposable VM)
 3- GW (Tor) - WS (TBB + my surfing) (normal VM)
 4- GW (Tor) - WS (TBB + Z website) (disposable VM)
 5- GW (Tor) - WS (TBB + V website) (disposable VM)

 .....etc from hardening things we can put inside this theory. but i dont
 know if its going to be effective or not , and what will the ISP see when
 we apply this.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18034>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list