Building tracking system to nab Tor pedophiles

Jason Edwards jasonedwards3 at gmail.com
Wed Mar 7 22:51:10 UTC 2007


>> As suggested on IRC, I think
>> the Tor documentation strategy needs to be rethought. Most people
>> barely read the download page, let alone the reems of FAQ questions.
>>
>> We've had two "attacks" now on Tor that rely on unmasking users who
>> use Tor incorrectly. One of them actually published a paper and had
>> decent results at unmasking this way (mostly Asian users who probably
>> can't read our english mailinglist or english FAQ), and the media
>> still doesn't seem to understand that these attacks are well
>> documented.
>>
>> The Tor download page should have a concice "Things to know before
>> downloading" section that lists a few key points about the most easy
>> ways your identity can be revealed through Tor. Something like
>>  
>> Things to know before you download Tor:
>>  - Browser plugins can be made to reveal your IP. 
>>  - This includes Flash, Java, ActiveX and others. 
>>    - It is recommended that you use FireFox and install the extensions 
>>      NoScript, QuickJava, and FlashBlock to control this behavior if
>>      you must have these plugins installed for non-Tor usage.
>>  - Make sure your browser settings have a proxy listed for ALL
>>    protocols (including Gopher and FTP).
>>  - For further details, please consult the Tor FAQ.
>>
>>     
>
> I had advocated something similar some time ago. Actually what I proposed
> was that some sort of test server be set up. I know there are already
> many of them, but I was thinking that there could be testing stages
> in an install wizard (or a post-install testing wizard)
> that takes the user through various tests and what to do in response
> to results. I know a lot of work, maybe another suggestion to be
> listed on the volunteer page or a candidate for summer of code?
>
>   
As a new user (about a week now) and without much of a background, 
hopefully I can offer some insight.  The installation and documentation 
to get up and started is very helpful, especially the screen shots.  
However I am lost with Privoxy configuration, e-mail config (especially 
about the smtp port 465 in Thunderbird), and if.. how.. and when I need 
to  modify modify the torrc file.  I have  subscribed to all the lists 
and am doing my best to absorb the info. 

I usually learn new programs by futzing with them until I have learned 
the ins and outs. However, this is different because the learning curve 
could do some damage (stories of how Tor users were not protected).

My suggestions/responses to help protect green users like me from those 
who can take advantage of our lack of information are:

- A hold your hand walk through of add ons to Firefox and Thunderbird to 
be installed before attempting to use the programs ( just like the set 
info instructions, they were great)

- A few predefined configurations of Privoxy, Noscript etc. with a WALK 
THROUGH on how to access them, what they mean and how to tweak them in 
the future.

- The test server sounds like a great idea. I keep reading about things 
which break pages and reveal your identity but I have no idea if it is 
actually happening. Is there a way to set an alert which notifies the 
user that his/her anonymity has been compromised?

- Again, a list of IMPORTANT things you should not do is a great idea. I 
don't know if I can use another browser without privoxy etc installed 
after I have disconnected from Tor and wish to surf as I did previously. 
Is that bad? I am also pretty sure that I should not use any other 
programs which don't go through Tor while I am connected to Tor.  Is it 
ok to use them after I disconnect?

The takeaway from my rambling is that compromises to security and the 
networks reputation are going to come from users like me, not from a 
developer or experienced user.  To maintain integrity it is a good idea 
to devote time to developing better walk throughs regarding use after 
initial setup and to help new users  from hurting themselves or the 
reputation of the network.

Jay
 
 



More information about the tor-talk mailing list