Bitcoin Forum

Bitcoin => Bitcoin Discussion => Topic started by: awesome31312 on October 20, 2014, 03:07:21 PM



Title: Anonymity tips
Post by: awesome31312 on October 20, 2014, 03:07:21 PM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?


Title: Re: Anonymity tips
Post by: Velkro on October 20, 2014, 03:08:37 PM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

Man this sounds so shady its insane :D
Stop doing scams and noone will search for you. NSA doesn't want to know your identity, dont worry, they already know :)

On serious note, tor should be enough if you know how to use it


Title: Re: Anonymity tips
Post by: Elwar on October 20, 2014, 03:10:08 PM
Considering Bitcointalk is a central entity, they can be persuaded to turn over information.


Title: Re: Anonymity tips
Post by: redsn0w on October 20, 2014, 03:14:08 PM
Considering Bitcointalk is a central entity, they can be persuaded to turn over information.

Yes of course , bitcointalk.org is not decentralized  :D.


Title: Re: Anonymity tips
Post by: awesome31312 on October 20, 2014, 03:30:51 PM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

Man this sounds so shady its insane :D
Stop doing scams and noone will search for you. NSA doesn't want to know your identity, dont worry, they already know :)

On serious note, tor should be enough if you know how to use it

I'm so fed up of this same old ignorance that haunts the forums.

Not everyone who wants his rights is doing something wrong.

Can I install cameras in the shower? Why not? If you aren't doing anything wrong, you have nothing to hide!


Title: Re: Anonymity tips
Post by: neurotypical on October 20, 2014, 03:34:07 PM
Just get some free proxy, there are lots. I use them to browse the internet at college, most websites are blocked for some reason.


Title: Re: Anonymity tips
Post by: Joe_Bauers on October 20, 2014, 04:14:06 PM
The only way to be anonymous on the internet is to not be on the internet ;)


Title: Re: Anonymity tips
Post by: HeroCat on October 20, 2014, 04:48:37 PM
I am not sure that TOR can help in anonymity 100%. I had a one case, when using TOR website tell me from where I am, well this was only one time ... The website advert show the country ...


Title: Re: Anonymity tips
Post by: awesome31312 on October 20, 2014, 05:15:33 PM
I am not sure that TOR can help in anonymity 100%. I had a one case, when using TOR website tell me from where I am, well this was only one time ...

That's funny, where was this?


Title: Re: Anonymity tips
Post by: LiteCoinGuy on October 20, 2014, 05:23:28 PM
Satoshi is watching you.


Title: Re: Anonymity tips
Post by: Lauda on October 20, 2014, 05:28:24 PM
The only way to be anonymous on the internet is to not be on the internet ;)
Not really. True anonymity could be achieved but advanced coding, networking, hacking skills would be needed.
TOR can somewhat help you be anonymous, well it's enough unless you're doing some illegal shit.


Title: Erik Voorhees, Coinapult
Post by: bluemeanie1 on October 20, 2014, 05:44:53 PM
A thread I just started about Coinapult and privacy. (https://bitcointalk.org/index.php?topic=829287.0)


Title: Re: Anonymity tips
Post by: J. J. Phillips on October 20, 2014, 08:11:21 PM
I think using Tor carefully and consistently to access bitcointalk means they don't have identifying info (except your email address) to hand over.

Thanks to the bitcointalk admins for allowing Tor access. The peace of mind was worth the few mbits I paid to remove my "Tor evil" when I registered.

If you get targetted by the NSA or similar state level actors, Tor would probably not be enough.


Title: Re: Anonymity tips
Post by: Blinken on October 20, 2014, 09:06:19 PM
Can I install cameras in the shower? Why not? If you aren't doing anything wrong, you have nothing to hide!

Just because you are doing nothing wrong doesn't mean there aren't people who want to kill you and/or take your money.


Title: Re: Anonymity tips
Post by: Lionel on October 20, 2014, 09:09:03 PM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

Man this sounds so shady its insane :D
Stop doing scams and noone will search for you. NSA doesn't want to know your identity, dont worry, they already know :)

On serious note, tor should be enough if you know how to use it

I'm so fed up of this same old ignorance that haunts the forums.

Not everyone who wants his rights is doing something wrong.

Can I install cameras in the shower? Why not? If you aren't doing anything wrong, you have nothing to hide!

Ever seen The Truman Show movie? Truman wasn't doing anything wrong, but it found annoying to live forcibly on the spotlight

That's why someone invented the concept of privacy for everyone not just criminals


Title: Re: Anonymity tips
Post by: franky1 on October 20, 2014, 09:42:13 PM
anonymity is only as anonymous as YOU decide to make it,

EG. things we can find out about Awesome31312 in 2 minutes

went to chicago bitcoin meetup
doesnt wear glasses
bitcoin clients: armory(back in the day) now bitcoin-core
likes runescape, dislikes world or warcraft
main bitcoin address: 12vARzQRPwUf19sCGUNUYasBK1kYu3F3xw
torchat id: ykdqiugengjud62z

and thats just 2 minutes of searching.....




Title: Re: Anonymity tips
Post by: Lionel on October 20, 2014, 10:09:58 PM
I am not sure that TOR can help in anonymity 100%. I had a one case, when using TOR website tell me from where I am, well this was only one time ...

Wow :O But it told you the exact city you are from or only the country?
Maybe the TOR exit node you were using was located in your country


Title: Re: Anonymity tips
Post by: franky1 on October 20, 2014, 11:07:10 PM
I am not sure that TOR can help in anonymity 100%. I had a one case, when using TOR website tell me from where I am, well this was only one time ...

Wow :O But it told you the exact city you are from or only the country?
Maybe the TOR exit node you were using was located in your country

tor is only good for onion websites that use https....

normal dot coms and http sites are not protected via tor.


Title: Re: Anonymity tips
Post by: Balkhole on October 20, 2014, 11:25:07 PM
I am not sure that TOR can help in anonymity 100%. I had a one case, when using TOR website tell me from where I am, well this was only one time ...
tor does not help you 100% as there are ways to attack a tor user (for example timing attacks) to uncover their identity.

There is really not any very good ways to be 100% certain that your identity will not get leaked


Title: Re: Anonymity tips
Post by: awesome31312 on October 21, 2014, 02:11:10 AM
anonymity is only as anonymous as YOU decide to make it,

EG. things we can find out about Awesome31312 in 2 minutes

went to chicago bitcoin meetup
doesnt wear glasses
bitcoin clients: armory(back in the day) now bitcoin-core
likes runescape, dislikes world or warcraft
main bitcoin address: 12vARzQRPwUf19sCGUNUYasBK1kYu3F3xw
torchat id: ykdqiugengjud62z

and thats just 2 minutes of searching.....





Hahahah close.



Title: Re: Anonymity tips
Post by: pitham1 on October 21, 2014, 09:46:27 AM
Thanks to the bitcointalk admins for allowing Tor access. The peace of mind was worth the few mbits I paid to remove my "Tor evil" when I registered.

I didn't get this. You paid a few mbits?


Title: Re: Anonymity tips
Post by: Westin Landon Cox on October 21, 2014, 05:14:07 PM
I just watched this (old) talk by someone called The Grugq. He sounds like he knows what he's talking about to me. (I'm no expert.)

https://www.youtube.com/watch?v=9XaYdCdwiWU (https://www.youtube.com/watch?v=9XaYdCdwiWU)

He talks about Tor vs. VPNs in part of it, and recommends always using Tor first, then possibly a VPN.

It's a fun talk. I really enjoyed his pokes at the dumb mistakes the lulzsec hackers made.


Title: Re: Anonymity tips
Post by: J. J. Phillips on October 21, 2014, 06:21:35 PM
Thanks to the bitcointalk admins for allowing Tor access. The peace of mind was worth the few mbits I paid to remove my "Tor evil" when I registered.

I didn't get this. You paid a few mbits?

Yes. I consistently use Tor. When I registered at bitcointalk, it said I couldn't use my account until I paid X satoshis to remove my "Tor evil."
I thought this phrase was funny, so I remembered it. I don't remember how much X was, but I think it was somewhere around a dollar's worth.

As people who use Tor can tell you, many sites will either make you constantly fill out CAPTCHAs or just block you entirely. I'm happy that
bitcointalk allows Tor users to participate at all.


Title: Re: Anonymity tips
Post by: moriartybitcoin on October 21, 2014, 06:26:05 PM
Bitcointalk admins will turn over your identity, IP address etc at the drop of a hat - you can bet on it!

You should DEFINITELY be using TOR for Bitcointalk and any other website you visit, whether darknet or clearnet.

I recommend using TAILS in conjunction with TOR. 


Title: Re: Anonymity tips
Post by: franky1 on October 21, 2014, 08:36:11 PM
anonymity is only as anonymous as YOU decide to make it,

EG. things we can find out about Awesome31312 in 2 minutes

went to chicago bitcoin meetup
doesnt wear glasses
bitcoin clients: armory(back in the day) now bitcoin-core
likes runescape, dislikes world or warcraft
main bitcoin address: 12vARzQRPwUf19sCGUNUYasBK1kYu3F3xw
torchat id: ykdqiugengjud62z

and thats just 2 minutes of searching.....
Hahahah close.

runescape should be green. after all you are trying to buy bitcoins with your runescape gold, so admit you play the game :D
Hello

I am currently buying Bitcoins for RSGP at the rate of $0.4/m, whatever that is in Bitcoin

I'm trying to keep this post as short as I can, so any further questions will be addressed below

as for the chicago thing
http://bitbiz.io/threads/btc-chicago.74/#post-3058



Title: Re: Anonymity tips
Post by: 2dogs on October 21, 2014, 08:36:43 PM
anonymity is only as anonymous as YOU decide to make it,

EG. things we can find out about Awesome31312 in 2 minutes

went to chicago bitcoin meetup
doesnt wear glasses
bitcoin clients: armory(back in the day) now bitcoin-core
likes runescape, dislikes world or warcraft
main bitcoin address: 12vARzQRPwUf19sCGUNUYasBK1kYu3F3xw
torchat id: ykdqiugengjud62z

and thats just 2 minutes of searching.....





Hahahah close.



Who believes everything they read on the internet?
Ever hear about disinfo?
Some post info that is completely false and misleading - just to throw out false and misleading data.


Title: Re: Anonymity tips
Post by: franky1 on October 21, 2014, 08:48:32 PM
i know but most people throw out personal info about themselves without realizing they did it., and that was my point, the OP wants to be anonymous, yet he has already given out lots of info casually.

so people are only as anonymous as the information they give out. no technology can protect them from simply supplying info publicly


Title: Re: Anonymity tips
Post by: pitham1 on October 22, 2014, 02:03:45 AM
Thanks to the bitcointalk admins for allowing Tor access. The peace of mind was worth the few mbits I paid to remove my "Tor evil" when I registered.

I didn't get this. You paid a few mbits?

Yes. I consistently use Tor. When I registered at bitcointalk, it said I couldn't use my account until I paid X satoshis to remove my "Tor evil."
I thought this phrase was funny, so I remembered it. I don't remember how much X was, but I think it was somewhere around a dollar's worth.

As people who use Tor can tell you, many sites will either make you constantly fill out CAPTCHAs or just block you entirely. I'm happy that
bitcointalk allows Tor users to participate at all.

That is strange.
It is just discouraging people from using tor.
And if you have a compulsive need to use tor (say to perform some illegal acts), you can still do it by paying a $?


Title: Re: Anonymity tips
Post by: 1echo on October 22, 2014, 03:19:48 AM
awesome is ICO coin dev and asks for anonimty

this looks sketchy to me ^^^^^^^


Title: Re: Anonymity tips
Post by: awesome31312 on October 22, 2014, 04:47:23 AM
anonymity is only as anonymous as YOU decide to make it,

EG. things we can find out about Awesome31312 in 2 minutes

went to chicago bitcoin meetup
doesnt wear glasses
bitcoin clients: armory(back in the day) now bitcoin-core
likes runescape, dislikes world or warcraft
main bitcoin address: 12vARzQRPwUf19sCGUNUYasBK1kYu3F3xw
torchat id: ykdqiugengjud62z

and thats just 2 minutes of searching.....
Hahahah close.

runescape should be green. after all you are trying to buy bitcoins with your runescape gold, so admit you play the game :D
Hello

I am currently buying Bitcoins for RSGP at the rate of $0.4/m, whatever that is in Bitcoin

I'm trying to keep this post as short as I can, so any further questions will be addressed below

as for the chicago thing
http://bitbiz.io/threads/btc-chicago.74/#post-3058



The fact that I'm trying to get rid of my RSGP for Bitcoin means I no longer like that game, common sense mate:P

Also the post:
"I went to a Bitcoin convention once, and was the only guy with no glasses "

Was supposed to be funny


Title: Re: Anonymity tips
Post by: Westin Landon Cox on October 22, 2014, 07:59:57 PM
People do leak info about themselves very easily. If you're serious about anonymity, a friend of mine wrote a python program called "idmas" that generates identities (with a name, birthday and nationality) along with passwords and bitcoin addresses and so on. It's open source:

https://github.com/cjbauer/idmas

The idea is that you can use the name when you sign up for something like bitcointalk without worrying about accidentally choosing a name/password that leaks information about you. The nationality and birthday thing is just so you can be in the mindset of who you're supposed to be.

I wish I'd had something like this before I joined bitcointalk. I have kind of a big mouth and there are too many Lois Lerner types in today's world. I think I've already mentioned roughly where I live and I stupidly used my full name as my username. I'm basically screwed.


Title: Re: Anonymity tips
Post by: ANTIcentralized on October 23, 2014, 12:03:35 AM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

Will TOR prevent the mods/administrators on bitcointalk from knowing your IP address/identity? Yes, as long as you have java script disabled (unless the forum were to attempt to launch a zero day attack against you, which is very unlikely considering the ideology of the people who run the forum).

Will the forum try to give your personal information to your ISP? No...absolutely now (see above). They would almost certainly give up your personal information to law enforcement in the event the forum receives a valid legally binding request (order) for information 


Title: Re: Anonymity tips
Post by: pequelore on October 23, 2014, 01:58:33 AM
Bitcointalk admins will turn over your identity, IP address etc at the drop of a hat - you can bet on it!

You should DEFINITELY be using TOR for Bitcointalk and any other website you visit, whether darknet or clearnet.

I recommend using TAILS in conjunction with TOR. 

What if I use VPN? Can bitcointal still track my identity?


Title: Re: Anonymity tips
Post by: Cryptowatch.com on October 23, 2014, 02:08:35 AM
if you use TOR, you announce to your ISP that you use TOR. What if you use VPN, then TOR through that?

Also, you can configure iptables to block any packets if your connection drops, so that there won't be an ip-leak.

Also, try this site:
http://ipleak.net/

It show a lot of information about your client.


Title: Re: Anonymity tips
Post by: awesome31312 on October 23, 2014, 06:08:15 AM
I'm only worried about admins knowing my personal information because I don't trust anyone on the internet with such sensitive data


Title: Re: Anonymity tips
Post by: franky1 on October 23, 2014, 06:13:52 AM
the point being if you give away personal info, it will be found.. no technology can stop that


Title: Re: Anonymity tips
Post by: bitnanigans on October 23, 2014, 02:30:13 PM
It is possible to maintain complete anonymity if you're very careful, but the problem is we are human. At some point, someone is bound to make a mistake sooner or later, which may result in identifying information being leaked/released.


Title: Re: Anonymity tips
Post by: Lionel on October 24, 2014, 08:09:25 PM
I am not sure that TOR can help in anonymity 100%. I had a one case, when using TOR website tell me from where I am, well this was only one time ...

Wow :O But it told you the exact city you are from or only the country?
Maybe the TOR exit node you were using was located in your country

tor is only good for onion websites that use https....

normal dot coms and http sites are not protected via tor.

I'm not 100% sure and i'd like having some details.
When you enter a site with TOR it's like the TOR's exit relay computer is using the site, and not your computer.

The site can even be http and not https but it still believes that the visitor is the tor exit relay.

I think the only one who knows of you is the TOR entry relay you are using to enter the TOR network


Title: Re: Anonymity tips
Post by: Lionel on October 24, 2014, 08:26:53 PM
if you use TOR, you announce to your ISP that you use TOR. What if you use VPN, then TOR through that?

Also, you can configure iptables to block any packets if your connection drops, so that there won't be an ip-leak.

Also, try this site:
http://ipleak.net/

It show a lot of information about your client.

Who cares if the ISP knows that, they still don't know what you were doing with TOR, and if they ask you just don't say the truth :)


Title: Re: Anonymity tips
Post by: dserrano5 on October 24, 2014, 08:46:06 PM
Who cares if the ISP knows that, they still don't know what you were doing with TOR, and if they ask you just don't say the truth :)

Depending on where you live, that could be awful advice. Bridge relays exist for a reason.


Title: Re: Anonymity tips
Post by: awesome31312 on October 25, 2014, 06:35:08 AM
if you use TOR, you announce to your ISP that you use TOR. What if you use VPN, then TOR through that?

Also, you can configure iptables to block any packets if your connection drops, so that there won't be an ip-leak.

Also, try this site:
http://ipleak.net/

It show a lot of information about your client.

Who cares if the ISP knows that, they still don't know what you were doing with TOR, and if they ask you just don't say the truth :)


Actually, if they ask me, I don't have to tell them unless they have a warrant against me, and since I'm the cleanest guy in the city, I doubt there will ever be such a thing.


Title: Re: Anonymity tips
Post by: campycoin on October 25, 2014, 08:41:36 AM
Bitcointalk admins will turn over your identity, IP address etc at the drop of a hat - you can bet on it!

You should DEFINITELY be using TOR for Bitcointalk and any other website you visit, whether darknet or clearnet.

I recommend using TAILS in conjunction with TOR. 

Yeah it sucks!  You can't even steal $80k anymore without people digging into your personal life and getting your fake Linkedin profile removed and your sites shut down.  Life sucks


Title: Re: Anonymity tips
Post by: awesome31312 on October 25, 2014, 09:21:46 AM
Bitcointalk admins will turn over your identity, IP address etc at the drop of a hat - you can bet on it!

You should DEFINITELY be using TOR for Bitcointalk and any other website you visit, whether darknet or clearnet.

I recommend using TAILS in conjunction with TOR. 

Yeah it sucks!  You can't even steal $80k anymore without people digging into your personal life and getting your fake Linkedin profile removed and your sites shut down.  Life sucks

You know, when they sell your personal information to data mining corporations, they make a little over $80k

Yeah, life does truly suck for sheeple like you


Title: Re: Anonymity tips
Post by: ranochigo on October 25, 2014, 11:06:53 AM
The problem is tor is not 100% anonymous and secure. Zero day exploits can still leak your identity and some websites block access to Tor exit node. Try getting a few private proxy and do proxy chaining, the anonymity can be improved.


Title: Re: Anonymity tips
Post by: Cryptowatch.com on October 25, 2014, 11:40:32 AM
The problem is tor is not 100% anonymous and secure. Zero day exploits can still leak your identity and some websites block access to Tor exit node. Try getting a few private proxy and do proxy chaining, the anonymity can be improved.

You could add vpn or several vpn's to the mix as well. Mixing TOR with a vpn is also possible.

If you want absolute anonymity get yourself a black van without windows in the back, and use public wifi's from public parking lots, throw TOR into the mix, and you should be pretty anonymous.

Rogue TOR exit nodes can pull MITM attacks on you as well, so look up for that and use end-to-end encryption to protect sensitive data.

But first consider what level of anonymity you need and which methods you should use to achieve that.

If you purchase a VPS, then set up OpenVPN and connect to that from your client, you will hide your internet traffic from your ISP and all websites you visit will only see the IP of your VPS. Still, if you do something nefarious, the traffic could be traced back to your VPS, and if there are logs, or you have registered with your name using a cc for example, it could easily be traced, and real life identity could be derived from isp by law enforcement.

It all depends on what you need and what you're doing. For legitimate purposes going insane paranoid shouldn't be necessary imo.


Title: Re: Anonymity tips
Post by: ranochigo on October 25, 2014, 11:46:40 AM
The problem is tor is not 100% anonymous and secure. Zero day exploits can still leak your identity and some websites block access to Tor exit node. Try getting a few private proxy and do proxy chaining, the anonymity can be improved.

You could add vpn or several vpn's to the mix as well. Mixing TOR with a vpn is also possible.

If you want absolute anonymity get yourself a black van without windows in the back, and use public wifi's from public parking lots, throw TOR into the mix, and you should be pretty anonymous.

Rogue TOR exit nodes can pull MITM attacks on you as well, so look up for that and use end-to-end encryption to protect sensitive data.

But first consider what level of anonymity you need and which methods you should use to achieve that.

If you purchase a VPS, then set up OpenVPN and connect to that from your client, you will hide your internet traffic from your ISP and all websites you visit will only see the IP of your VPS. Still, if you do something nefarious, the traffic could be traced back to your VPS, and if there are logs, or you have registered with your name using a cc for example, it could easily be traced, and real life identity could be derived from isp by law enforcement.

It all depends on what you need and what you're doing. For legitimate purposes going insane paranoid shouldn't be necessary imo.
Use a cheap bulletproof host if you are afraid of them exposing you. If you visit unsecured websites with Tor, your information transferred can be seen by exit nodes. If you use VPN together with Tor, your VPN provider can still expose you if they want to.


Title: Re: Anonymity tips
Post by: Cryptowatch.com on October 25, 2014, 12:26:53 PM
Use a cheap bulletproof host if you are afraid of them exposing you.

How do you determine if a host is bulletproof? From what I've learned, some companies are simply fronts for intelligence agencies. As long as you don't do anything illegal, you probably have nothing to fear anyway, even if there was an intelligence agency recording all that you did with your vpn. Besides you only have the word of the host that there's no logging. The host is also using servers in various datacentres, and we don't know if there's any additional logging apart from on the machine your vpn-instance resides on. For example, the routers in the datacenter might log traffic as well, so even if there's no logs on the server running the vpn-instance, law enforcement might be able to extract logs anyway. Also, some datacenters have dedicated boxes installed by intel agencies recording EVERYTHING that goes in and out of that datacenter. In addition, if there's a server of interest, that servers traffic might  as well be hijacked (http://www.theverge.com/2013/7/21/4541342/isp-owner-describes-nsa-box-that-spied-on-customers)

If a box of interest was shared between several VPN-users, also the traffic of the innocent users would be captured. As we know, there's even been reports of BIOS-level backdoors in some servers, according to Snowden leaks. And some systems are even stopped in transit, so the NSA special division can inject backdoors in systems of interest before they're shipped to their end destination. For example, there's been tales of computer systems that have had radio transmitters injected inside the cabinet, and then the intel crew just drives up in a van within radio range and connects to that machine, altering files and extracting files.

If you visit unsecured websites with Tor, your information transferred can be seen by exit nodes.

Exactly, and there's been several report of this. People thinking they're safe when using tor, and then all their e-mails has been exposed... Use PGP for private e-mails if you want to keep them confidential.

If you use VPN together with Tor, your VPN provider can still expose you if they want to.

The VPN provider can only expose you if they have your actual IP address. If they do not have that, they can only reveal whatever IP you did connect from.

I have not investigated VPN/TOR combinations much but for instance, if you use ssh over TOR the vps you're connecting to will only see the TOR exit IP, and the TOR exit node will only see encrypted traffic.

As with everything else - define what you need, and then make a plan sufficient to fullfill the requirements. For example, any VPN provider is sufficient to hide web surfing from your local ISP and it will also give all websites an ip which is not your home ip, and it's also good for switching location if you want to use certain services that's not available in your country.

Lastly, I'm a bit annoyed with people stating that people concerned about privacy and anonymity is up to something bad. I would love to have such people broadcast from their toilet or bedroom to the entire world 24/7, they don't have anything to hide, right?

That paragraph was not meant for anyone in this thread however particularly, just a general thought. Personally I think avoiding cookie tracking, targeted ads, and preserving a certain level of anonymity online is important. I find it uneasy to know that my real life identity is only a phone call away for the person with the right authority if I surf the web with my real IP.

For the same reason, most of the time when going for a walk, I don't bring with me a mobile phone. It's not because I'm up to something bad, but it's because I do not like the fact that I cannot move freely without some faceless organization follow my every move.

Imagine the looks on people's face if an official approached them, then proceeded to put a tracking device in their pocket, patting their backs and saying: "Hey, it's all good - just keep this on you, we need to track you wherever you go, if you have nothing to hide, don't worry,  nothing will happen, it's for your own protection, to prevent terrorism and to save the children".

I think very many people would feel extremely uneasy about that - yet they voluntarily carry around devices that track their every move, and also possibly is remotely accessible at a moments notice for those with the right knowledge, the baseband stuff in a mobile phone is not known to be very secure..

In addition, these days we have police running around with powerful Stingray devices (http://www.homelandsecuritynewswire.com/dr20141020-growing-scrutiny-of-police-use-of-stingray-surveillance-technology). I better hope you did not purchase a phone from a former drug dealer or terrorist suspect without knowing it, once the police comes around with a stingray device, you might be having a really nasty experience..

I can't for the life of me understand why anyone willingly want to carry devices that the police can tap into easily, and in addition devices that track far too much about your habbits.

http://www.thestar.com/news/world/2013/02/27/the_astonishing_amount_of_personal_data_police_can_extract_from_your_smartphone.html

Even stuff on your phone that you delete is not really deleted according to the source above.

What's important to realize is that our rights and freedoms are step by step removed, leading to a totalitarian state system.

That's why knowledge, and protecting yourself is important. For example, there's been stories of bloggers being sued because they write negative reviews of a company. If these bloggers ran their blogs anonymously and it was not possible to find their identity, a legal challenge would simply not work.

Being anonymous is also being safer imo. True, some people will always do bad things protected by anonymity, but as we've seen, those targeting big enough goals have been brought down. It's easy to slip up somewhere.



Title: Re: Anonymity tips
Post by: Westin Landon Cox on October 25, 2014, 12:45:48 PM
Bitcointalk admins will turn over your identity, IP address etc at the drop of a hat - you can bet on it!

You should DEFINITELY be using TOR for Bitcointalk and any other website you visit, whether darknet or clearnet.

I recommend using TAILS in conjunction with TOR. 

Yeah it sucks!  You can't even steal $80k anymore without people digging into your personal life and getting your fake Linkedin profile removed and your sites shut down.  Life sucks

I'm sure there are scammers who try to remain anonymous for that reason.

Honest people have plenty of reasons to remain anonymous too though. Look at the IRS scandal. Even if you do nothing wrong, they can make your life a living hell. Just because they don't like you or your political views.

Even if you're the type who trusts government officials (hard for me to understand), look up Brett Kimberlin. He's a private citizen who goes around harassing and suing bloggers who bring up his well-known, criminal past as the "Speedway Bomber." This costs people so much time, money and energy, that the prudent thing to do is not bring it up. There's also evidence that he's engaged in "swatting" -- making false police reports that end up with SWAT teams being sent to the house of someone he doesn't like.

Bitcoiners are very unpopular in some circles. Do you really feel secure that no one willing to "swat" you or sue you will ever read something you wrote and decide they really don't like it?

Even if you feel safe now, what if the BTC/USD goes through another spike or two? There's the obvious possibility of online strangers tracking you down in real life and trying to coerce you to give them money.


Title: Re: Anonymity tips
Post by: campycoin on October 25, 2014, 03:20:32 PM
Bitcointalk admins will turn over your identity, IP address etc at the drop of a hat - you can bet on it!

You should DEFINITELY be using TOR for Bitcointalk and any other website you visit, whether darknet or clearnet.

I recommend using TAILS in conjunction with TOR. 

Yeah it sucks!  You can't even steal $80k anymore without people digging into your personal life and getting your fake Linkedin profile removed and your sites shut down.  Life sucks

I'm sure there are scammers who try to remain anonymous for that reason.

Honest people have plenty of reasons to remain anonymous too though. Look at the IRS scandal. Even if you do nothing wrong, they can make your life a living hell. Just because they don't like you or your political views.

Even if you're the type who trusts government officials (hard for me to understand), look up Brett Kimberlin. He's a private citizen who goes around harassing and suing bloggers who bring up his well-known, criminal past as the "Speedway Bomber." This costs people so much time, money and energy, that the prudent thing to do is not bring it up. There's also evidence that he's engaged in "swatting" -- making false police reports that end up with SWAT teams being sent to the house of someone he doesn't like.

Bitcoiners are very unpopular in some circles. Do you really feel secure that no one willing to "swat" you or sue you will ever read something you wrote and decide they really don't like it?

Even if you feel safe now, what if the BTC/USD goes through another spike or two? There's the obvious possibility of online strangers tracking you down in real life and trying to coerce you to give them money.

The problem that everyone continues to miss is simple in my opinion...

There are generally two types of Bitcoin users, the user (like you or I) who hold their own private keys.  Those people should be able to be 100% anonymous.  If I want to send $1000 to my sister, that is nobodys business.  Not the IRS, not PayPal, not Visa or Mastercard or Western Union or Money Gram. It is a transfer from myself to my sister.  That should be an anonymous transaction and I don't think anyone disagrees with that. 

But then there is the second group of people who handle bitcoin. This group runs websites or operates a store or a service online.  These are the assholes (like Moriarty) who still go around claiming that bitcoin should be anonymous....  FUCK THAT

There is no way that you can remain anonymous and be in charge of other people's money or private keys. It will always... as it has with Ryan Kennedy, with Mt. Gox, with HYIP Scams and Ponzi Schemes, and with Michael Moriarty... turn out bad.  This is the current problem with Bitcoin. Is the fact that a new group of people has popped up... selling Starbucks cards, selling Microsoft and Porn accounts, buying and selling BTCTalk accounts because they can remain anonymous. Well, there is the issue.  90% of these people are scammers who will walk with your money first chance they get.  I mean, all it takes is one look at Michael Moriarty to see what Bitcoin has done and what it will continue to do until people stop supporting these guys. Michael STOLE $80k from RickyJames, just kept it, and yet still... 3 months later, continues to buy domains, buy Senior Accounts, and flaunt his scammy sites all around this forum.  Why?  Because he is anonymous. He used fake info to buy his domains, so if you go look him up, he is fake.  No man by that name... the address and phone are fakes and he gets to parade around in his Mercedes and talk shit because nobody can do anything about it. 

This will just continue to make life easier for these low lifes who now know that bitcoin is easy to scam with.  Set up a fake website or a fake gambling site.  Lie on your domain registration, use Tor and boom!  Steal when you want.  BUSINESS OWNERS, EXCHANGES or anywhere where someone else is able to get to your money must be transparent and real.  And if they don't like it, then don't use bitcoin in your business.  Or just steal like Moriarty and be a scammy cunt. 


Title: Re: Anonymity tips
Post by: Cryptowatch.com on October 25, 2014, 04:02:43 PM
Campycoin, I have sympathy for your views.

However, users need to be really careful as well. When a service is brand new, without a reputation, being careful is good. Also, while anonymity might give some characters a sense of security and superiority, if they scam enough, one day they might fall.

Trendon Shavers (http://www.fairbinaryoptions.com/blog/2013/08/26/bitcoin-ponzi-scheme/) was a man that promised quick returns on your money, and due to greed and naivity, many users invested with him. He was fairly anonymous for a long time, and stunningly many believed he ran a legitimate business, and many was on the level beneath him, acting as pass throughs. This is subtly equal to the Madoff Affair (http://www.financedocumentaries.com/2011/06/madoff-affair.html).

He never hid, he was never anonymous, he operated in plain sight, and there were numerous warnings about what was going on. He basically printed his own charts, showing immense and consistent returns that were in no way possible through any known trading strategy. His conglomerate of associates and investors was immensely big, many invested with him and was delivered reports showing that their investment paid off very well.. on paper .. while in reality these values did not exist, he just made it up. Early participants were paid with the money of new participants. All while he led a very luxury life style. He always appeard as a solid guy outwards, and nobody really wanted to touch him or investigate him, because he was such a big deal. A few men decides to pursue him, and after 10 years hunting him, the scandal finally broke, and as a consequence several SEC employees were punished. The SEC was notified many years before the card house fell togheter, but did not take action. The total loss in the case was $64.8 billion.

Mark Karpeles, running the biggest bitcoin exchange MtGox caused 400 millions to disappear. He operated in plain sight, with his name, and appeared in numerous tv-channels and magazines.

My point being that using your real identity is by no way an assurance that you never will go rogue. I don't think this has anything to do with anonymity or no anonymity. It has to do with character. Some people can shake your hand, smile to your, and pretend to be your best friend, but they only want to rob you blind. Other people may never reveal their name and only deal with you over a distance through e-mail, im, irc and forum and be a mother Theresa in terms of honesty.

Sure, you can believe you can hide behind anonymity and that nothing will ever happen to you.

Ross William (http://www.forbes.com/sites/andygreenberg/2013/10/02/end-of-the-silk-road-fbi-busts-the-webs-biggest-anonymous-drug-black-market/) Ulbricht, alleged to be the “Dread Pirate Roberts”, behind Silk Road's drug black market was caught. He never intended to be discovered, but at one point, the FBI managed to find his identity and take him down. He was caught in a library in San Francisco, USA.

While small time scammers might hide behind anonymity and get away with it, it's also very important for users to educate themselves and be vigilant. If you exercise caution and is careful, the chance of being scammed is far less. Usually if something appears to be too good to be true, it usually is. There are many signs you could look after before you decide to put your money on the table. Sometimes there are red signs, and then you should really think hard if this is where you want to put your money.

Gift cards is something all bitcoin users should be very careful with. There are a lot of scams involved in this regard, and if you buy stolen cards, there might as well be trouble in store for you. A lot of the scams that we see, is due to users not being careful enough.

Personally I don't think lack of anonymity will cause less scamming. Also you must be aware that bitcoin is something new, and in some jurisdictions it could have very bad consequences for operators of a bitcoin business if they are caught conducting this business, so they chose to operate an anonymous business. And I don't see anything wrong in that really. I think it's a beautiful thing. Sure it could be a vehicle for scams, but there's also lots of scams in the real world. I've had handymen to our house charging with a fork on the zeroes on the bill, while telling us it's not going to be such a big charge when they initiate the work, so they complete the work, leave and send a bill thats outside any reasonable proportions.

Again it's down to character. Some people are scammers by nature, others are not.

So - it might appear like the scammer is having a great life, having a nice car, a nice house, perhaps even a nice woman. But everything can come crashing down really really hard, and then it's not fun anymore, and also, having all these nice things does not mean that this person that scammed you have a good life. He might have a life of constant turmoil, and he lives in knowledge of the fact that any day some person might expose his scam, and everything might come crashing down on him. Imo, people flaunting all their status symbols very often are not very happy humans.



Title: Re: Anonymity tips
Post by: campycoin on October 25, 2014, 04:34:51 PM
@Cryptowatch.com

Great points and a nice read.  I do feel that there is an issue with the anonymous or not  mindset though.  I think it is impossible for their not to be.  When people feel like they can't be touched, they will usually go too far.  It happens to everyone.  But you're correct when they end up being put in their place.

This happens in all aspects of life... drug use for example.  Person starts small and then feels they are invincible, then it is too late.  I had this happen to me in regards to sex at a young age. Had sex with a condom 3 or 4 times, took it off 5 or 6 times, didn't even consider it 10 or 20 times and BOOM, I was a Dad at 19. So, I think it is human nature and that's why I remind people to just be smart and safe.  I think the scammers are flocking because they see a community that is growing everyday and with everyday comes 1000's of "newbies" and it scares me to think that those 1000's still have a head of them the trials and tribulations I had to endure in my first year of crypto.

But point taken, anonymous or not... it is a character thing.  I couldn't steal $80k if it was 100% guaranteed I'd never get caught.  I just couldn't even sleep.  Although I could afford sleeping pills or some great pot.


Title: Re: Anonymity tips
Post by: pooya87 on October 25, 2014, 04:43:03 PM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

i suggest you do NOT use TOR, or anything like that unless you absolutely know what you are doing and how to protect yourself.
in my experience i saw a lot of people lose their bitcoins in this way. do a quick search on the web about losing bitcoins and using TOR.
here is an example i came across a couple of days before:
https://www.reddit.com/r/Bitcoin/comments/2k38ta/my_wallet_was_just_emptied_stolen_but_i_dont_know

also it is good to take a look at this article:
http://arxiv.org/abs/1410.6079


Title: Re: Anonymity tips
Post by: BootstrapCoinDev on October 25, 2014, 10:53:21 PM
The problem is tor is not 100% anonymous and secure. Zero day exploits can still leak your identity and some websites block access to Tor exit node. Try getting a few private proxy and do proxy chaining, the anonymity can be improved.
Using Tor though it’s not as secure as ssh tunneling especially logging using signed keys but compared to unencrypted especially through hostile infrastructures (ie work, university, or even nation wide firewalls) i could prove it’s self as a viable alternative to unencrypted browsing. On the other hand I also believe that having a an ssh server at home, or any other place you (and only you or people you trust) have access could prove very handy.


Title: Re: Anonymity tips
Post by: Westin Landon Cox on October 26, 2014, 05:25:06 PM
But point taken, anonymous or not... it is a character thing.  I couldn't steal $80k if it was 100% guaranteed I'd never get caught.  I just couldn't even sleep.  Although I could afford sleeping pills or some great pot.

Hey, just wanted to say I appreciated your posts and I thought this paragraph in particular was worth repeating.


Title: Re: Anonymity tips
Post by: andrewbb on October 26, 2014, 05:41:32 PM
CommerceID is the answer.  Look it up.


Title: Re: Anonymity tips
Post by: El Emperador on October 26, 2014, 09:12:01 PM
The only way to be anonymous on the internet is to not be on the internet ;)

Lol  ;D... But it's true...


Title: Re: Anonymity tips
Post by: El Emperador on October 26, 2014, 09:14:57 PM
If you aren't doing anything wrong, you have nothing to hide!

This is the ol' naive mentality.
For most of us, privacy is one of the greatest values in our lives, because privacy is the base of freedom.


Title: Re: Anonymity tips
Post by: El Emperador on October 26, 2014, 09:18:12 PM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?


You can also use a mix cascade method or a multi-hop VPN.


Title: Re: Anonymity tips
Post by: opossum on October 27, 2014, 09:15:32 AM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

i suggest you do NOT use TOR, or anything like that unless you absolutely know what you are doing and how to protect yourself.
in my experience i saw a lot of people lose their bitcoins in this way. do a quick search on the web about losing bitcoins and using TOR.
here is an example i came across a couple of days before:
https://www.reddit.com/r/Bitcoin/comments/2k38ta/my_wallet_was_just_emptied_stolen_but_i_dont_know

also it is good to take a look at this article:
http://arxiv.org/abs/1410.6079
The reddit post that you quote was actually (assuming the claim is true) a MITM attack that gave a fake blockchain.info webpage to the OP of the reddit thread. The OP of the reddit thread did not ever have his identity compromised from this attack. Although using TOR to use a blockchain.info wallet (and other financial transactions) may not be very secure, you are not risking your identity being exposed


Title: Re: Anonymity tips
Post by: Cryptowatch.com on October 27, 2014, 09:24:39 AM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

i suggest you do NOT use TOR, or anything like that unless you absolutely know what you are doing and how to protect yourself.
in my experience i saw a lot of people lose their bitcoins in this way. do a quick search on the web about losing bitcoins and using TOR.
here is an example i came across a couple of days before:
https://www.reddit.com/r/Bitcoin/comments/2k38ta/my_wallet_was_just_emptied_stolen_but_i_dont_know

also it is good to take a look at this article:
http://arxiv.org/abs/1410.6079
The reddit post that you quote was actually (assuming the claim is true) a MITM attack that gave a fake blockchain.info webpage to the OP of the reddit thread. The OP of the reddit thread did not ever have his identity compromised from this attack. Although using TOR to use a blockchain.info wallet (and other financial transactions) may not be very secure, you are not risking your identity being exposed

Anyway, if blockchain.info serves everything over https, then it should be safe? If they do not - oh dear..


Title: Re: Anonymity tips
Post by: Westin Landon Cox on October 27, 2014, 07:12:12 PM
Regarding anonymity tips...I posted a link earlier to a talk by The Grugq. There's also a writeup at privacy-pc:

http://privacy-pc.com/articles/hackers-guide-to-stay-out-of-jail-opsec-for-freedom-fighters.html

I'm not much of a "hacker" but it's interesting reading. I like the distinction he draws been anonymity and privacy.

"Privacy protects your data. Anonymity protects you."

A friend also pointed me to this:

http://www.deepdotweb.com/2014/02/13/introducing-jolly-rogers-security-guide-for-beginners/

It's very long, but also interesting reading. There's a few stories of local bitcoin deals that go wrong.


Title: Re: Anonymity tips
Post by: opossum on October 28, 2014, 05:03:42 AM
As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

i suggest you do NOT use TOR, or anything like that unless you absolutely know what you are doing and how to protect yourself.
in my experience i saw a lot of people lose their bitcoins in this way. do a quick search on the web about losing bitcoins and using TOR.
here is an example i came across a couple of days before:
https://www.reddit.com/r/Bitcoin/comments/2k38ta/my_wallet_was_just_emptied_stolen_but_i_dont_know

also it is good to take a look at this article:
http://arxiv.org/abs/1410.6079
The reddit post that you quote was actually (assuming the claim is true) a MITM attack that gave a fake blockchain.info webpage to the OP of the reddit thread. The OP of the reddit thread did not ever have his identity compromised from this attack. Although using TOR to use a blockchain.info wallet (and other financial transactions) may not be very secure, you are not risking your identity being exposed

Anyway, if blockchain.info serves everything over https, then it should be safe? If they do not - oh dear..
Apparently it is possible to execute a MITM attack even with the site is using HTTPS with the POODLE attack.

I think the only real way to protect yourself against this would be to verify a signed message from the site's PGP key (that is previously known) - or you could connect to a site's hidden service address as I don't think POODLE works with hidden services


Title: Re: Anonymity tips
Post by: awesome31312 on October 28, 2014, 09:24:01 AM
What's a MITM attack?

I did read up on it, but it wasn't descriptive enough  ???


Title: Re: Anonymity tips
Post by: rockyrotcoin on October 28, 2014, 10:54:09 AM
What's an MITM sir? Kindly elaborate it please.


Title: Re: Anonymity tips
Post by: ranochigo on October 28, 2014, 11:06:09 AM
What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server. If someone do an attack on you, when you surf an unencrypted webpage and key in information, the attacker can see the information. With https, it is encrypted and thus harder or even impossible to see the information. However, vulnerabilies can allow the attacker to see the information.


Title: Re: Anonymity tips
Post by: Cryptowatch.com on October 28, 2014, 11:15:24 AM
What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server. If someone do an attack on you, when you surf an unencrypted webpage and key in information, the attacker can see the information. With https, it is encrypted and thus harder or even impossible to see the information. However, vulnerabilies can allow the attacker to see the information.

Isn't most SSL vulnerabilities patched as they're found most of the time? Running up to date software, is it a risk on a daily basis now, of course there could be unknown attacks, but you should be reasonably safe?


Title: Re: Anonymity tips
Post by: awesome31312 on October 28, 2014, 11:43:15 AM
What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server.

What kind of information? Like passwords??


Title: Re: Anonymity tips
Post by: novacn on October 28, 2014, 01:52:46 PM
Sure, it's safe if you have a good habit.
If you don't, anything safe will eventually become unsafe.


Title: Re: Anonymity tips
Post by: Joe_Bauers on October 28, 2014, 03:36:08 PM
What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server.

What kind of information? Like passwords??

Like anything that you are sending to C.
A being you
B being MITM
C being your intended destination.


Title: Re: Anonymity tips
Post by: funtotry on October 28, 2014, 08:56:39 PM
What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server.

What kind of information? Like passwords??

Like anything that you are sending to C.
A being you
B being MITM
C being your intended destination.

In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for


Title: Re: Anonymity tips
Post by: Cryptowatch.com on October 28, 2014, 09:58:54 PM
In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Afaik, MITM attacks is non-trivial when communicating with end-to-end encryption. Clear text is entirely another matter, and is very risky.

For example, some activists have used TOR and thought they were safe, but still rogue exit nodes were able to read e-mails sent in the clear.


Title: Re: Anonymity tips
Post by: funtotry on October 28, 2014, 10:02:50 PM
In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Afaik, MITM attacks is non-trivial when communicating with end-to-end encryption. Clear text is entirely another matter, and is very risky.

For example, some activists have used TOR and thought they were safe, but still rogue exit nodes were able to read e-mails sent in the clear.
Many others thought the same was the case (myself included) however POODLE proved them wrong, as there is a vulnerability in certain protocols that is able to trick you into thinking that you are actually looking at a certain HTTPS site when you are in fact not


Title: Re: Anonymity tips
Post by: Cryptowatch.com on October 28, 2014, 10:15:21 PM
In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Afaik, MITM attacks is non-trivial when communicating with end-to-end encryption. Clear text is entirely another matter, and is very risky.

For example, some activists have used TOR and thought they were safe, but still rogue exit nodes were able to read e-mails sent in the clear.
Many others thought the same was the case (myself included) however POODLE proved them wrong, as there is a vulnerability in certain protocols that is able to trick you into thinking that you are actually looking at a certain HTTPS site when you are in fact not

I'm no expert, but is the POODLE still an issue? I would also think lots of intel agencies have groups working exactly with MITM attacks and other nefarious stuff.


Title: Re: Anonymity tips
Post by: ranochigo on October 29, 2014, 12:12:14 AM
In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Afaik, MITM attacks is non-trivial when communicating with end-to-end encryption. Clear text is entirely another matter, and is very risky.

For example, some activists have used TOR and thought they were safe, but still rogue exit nodes were able to read e-mails sent in the clear.
Many others thought the same was the case (myself included) however POODLE proved them wrong, as there is a vulnerability in certain protocols that is able to trick you into thinking that you are actually looking at a certain HTTPS site when you are in fact not

I'm no expert, but is the POODLE still an issue? I would also think lots of intel agencies have groups working exactly with MITM attacks and other nefarious stuff.
I don't think so. Even bitcointalk have fixed SSL3 vulnerability. New updates in browser would have them fixed. Tor have released a update fixing it long ago. But still, there may still be vulnerabilities that have yet been uncovered.


Title: Re: Anonymity tips
Post by: grumpyoldtroll on October 29, 2014, 05:54:17 AM
The only way to be anonymous on the internet is to not be on the internet ;)

Lol  ;D... But it's true...

So if you are going to use that in bitcoin, you need to have an offline wallet?


Title: Re: Anonymity tips
Post by: Joe_Bauers on October 29, 2014, 12:47:19 PM
What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server.

What kind of information? Like passwords??

Like anything that you are sending to C.
A being you
B being MITM
C being your intended destination.

In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Right, I should have clarified that as sending and receiving to/from C


Title: Re: Anonymity tips
Post by: awesome31312 on October 29, 2014, 02:23:57 PM
I just talked to an anonymous user on Silk Road via TOR, and he explained how to carry out such an attack. It seems that it is network based, which means the best way to remain anonymous on the internet is to simply not get in anyone's way. There are numerous users who can maintain their anonymity because they don't screw with the wrong people. DPR was busted because he operated Silk Road.



Title: Re: Anonymity tips
Post by: catena5260 on October 29, 2014, 02:29:35 PM
Satoshi remains anonymous even after his email got compromissed

Just mimic his behavior


Also it is said he used to use Tor


Title: Re: Anonymity tips
Post by: awesome31312 on October 29, 2014, 02:47:37 PM
Satoshi remains anonymous even after his email got compromissed

Just mimic his behavior


Also it is said he used to use Tor

His email wasn't compromised, some kid used a spoofer to make it look like he had access to the email address