[tor-talk] Free WiFi Bootable Ditros

jed c n_o_t_here at yahoo.com
Tue Jul 31 18:04:06 UTC 2012



--- On Tue, 7/31/12, Katya Titov <kattitov at yandex.com> wrote:

> From: Katya Titov <kattitov at yandex.com>
> Subject: Re: [tor-talk] Free WiFi Bootable Ditros
> To: tor-talk at lists.torproject.org
> Date: Tuesday, July 31, 2012, 5:06 AM
> jed c:
> > I wouldn't recommend TOR for anything personally
> identifying
> > (anything done on TOR has a chance of greater scrutiny
> and malicious
> > subversion).
> 
> Agree with that, however just because I'm using Facebook
> doesn't mean I
> will be identifying myself ... ;-)

That might be possible (not identifying yourself). But a few risks may remain. Consider the following: Have you ever used facebook before? Do you or have you talked in the past (FB email chat) with the people you are planning to communicate with? Do these people have any particularly identifying ideology?
Here is the problem I see with facebook. You have a biometric characteristic to the way you type. This can narrow the probability of who you are say to 1 in 25,000. The same can be said for the people you talk to. If you have previously communicated on facebook there is likely a signature there. There are millions on facebook but each additional person you friend is going to narrow down the possible network. If you friend a previous friend on facebook now the combined signature is more unique. The ideology part ties into the topics and words that people use which is also identifying. If you have the advantage of communicating in a different language and alphabet I'd recommend it.


> 
> > Have used Facebook through TOR with SSL enabled and
> watched a friends
> > computer get exploited during a chat session. SSL is
> pretty well
> > broken from my point of view.
> 
> I've seen a single SSL MITM, but that's it. I'm not a fan of
> SSL and see
> major issues, but I think it's far from broken.
> 
> > I wouldnt trust TOR for any executable download or
> software update
> > (pdfs and other exploited forms of media are
> questionable too). Best
> > use for tor is in a read only environment where no
> writable media is
> > present on your computer. I would recommend locking
> your bios, it
> > might not matter if there is a default secondary
> password.
> 
> I'm not sure that I'm quite that paranoid, but Tails can
> certainly
> provide a read-only environment.
> 
> Tails may not be designed for open WiFi networks, but until
> something
> else comes along it may be the best solution for my needs.
> -- 
> kat
> _______________________________________________
> tor-talk mailing list
> tor-talk at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 


More information about the tor-talk mailing list