Bitcoin Forum
May 28, 2024, 11:52:45 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4]  All
  Print  
Author Topic: Anonymity tips  (Read 4424 times)
Westin Landon Cox
Full Member
***
Offline Offline

Activity: 136
Merit: 100


Get your filthy fiat off me you damn dirty state.


View Profile WWW
October 27, 2014, 07:12:12 PM
 #61

Regarding anonymity tips...I posted a link earlier to a talk by The Grugq. There's also a writeup at privacy-pc:

http://privacy-pc.com/articles/hackers-guide-to-stay-out-of-jail-opsec-for-freedom-fighters.html

I'm not much of a "hacker" but it's interesting reading. I like the distinction he draws been anonymity and privacy.

"Privacy protects your data. Anonymity protects you."

A friend also pointed me to this:

http://www.deepdotweb.com/2014/02/13/introducing-jolly-rogers-security-guide-for-beginners/

It's very long, but also interesting reading. There's a few stories of local bitcoin deals that go wrong.

opossum
Hero Member
*****
Offline Offline

Activity: 924
Merit: 1000


View Profile
October 28, 2014, 05:03:42 AM
 #62

As Bitcoin users it is a common interest on maintain anonymity on the web.

I do have a few questions.

Is TOR enough to conceal one's identity on the web? Not the Deepweb, but on Bitcointalk
If there is an IP leak, do the administrators at Bitcointalk cooperate with efforts to distribute personal information of Bitcointalk users to ISPs?

i suggest you do NOT use TOR, or anything like that unless you absolutely know what you are doing and how to protect yourself.
in my experience i saw a lot of people lose their bitcoins in this way. do a quick search on the web about losing bitcoins and using TOR.
here is an example i came across a couple of days before:
https://www.reddit.com/r/Bitcoin/comments/2k38ta/my_wallet_was_just_emptied_stolen_but_i_dont_know

also it is good to take a look at this article:
http://arxiv.org/abs/1410.6079
The reddit post that you quote was actually (assuming the claim is true) a MITM attack that gave a fake blockchain.info webpage to the OP of the reddit thread. The OP of the reddit thread did not ever have his identity compromised from this attack. Although using TOR to use a blockchain.info wallet (and other financial transactions) may not be very secure, you are not risking your identity being exposed

Anyway, if blockchain.info serves everything over https, then it should be safe? If they do not - oh dear..
Apparently it is possible to execute a MITM attack even with the site is using HTTPS with the POODLE attack.

I think the only real way to protect yourself against this would be to verify a signed message from the site's PGP key (that is previously known) - or you could connect to a site's hidden service address as I don't think POODLE works with hidden services


 
         ▄▄█████████▄▄
      ▄█████████████████▄
   ▄████▀            ▀████▄
  █████                █████▄
 ███████████████████████████▄
████▀▀▀▀▀▀▀████████▀▀▀▀▀▀▀███▄
████        ██████        ████
████        ██████        ████
████        ██████        ████
████        ██████        ████
 ████▄      ██████      ▄████
  ▀████     ██████    ▄████▀
    ▀████▄▄▄██████▄▄▄████▀
      ▀▀██████████████▀▀
TIDEX



awesome31312 (OP)
Hero Member
*****
Offline Offline

Activity: 826
Merit: 504


View Profile
October 28, 2014, 09:24:01 AM
 #63

What's a MITM attack?

I did read up on it, but it wasn't descriptive enough  Huh

Account recovered 08-12-2019
rockyrotcoin
Member
**
Offline Offline

Activity: 75
Merit: 10


View Profile
October 28, 2014, 10:54:09 AM
 #64

What's an MITM sir? Kindly elaborate it please.
ranochigo
Legendary
*
Offline Offline

Activity: 2982
Merit: 4193



View Profile
October 28, 2014, 11:06:09 AM
 #65

What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server. If someone do an attack on you, when you surf an unencrypted webpage and key in information, the attacker can see the information. With https, it is encrypted and thus harder or even impossible to see the information. However, vulnerabilies can allow the attacker to see the information.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
Cryptowatch.com
Full Member
***
Offline Offline

Activity: 196
Merit: 103


View Profile WWW
October 28, 2014, 11:15:24 AM
 #66

What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server. If someone do an attack on you, when you surf an unencrypted webpage and key in information, the attacker can see the information. With https, it is encrypted and thus harder or even impossible to see the information. However, vulnerabilies can allow the attacker to see the information.

Isn't most SSL vulnerabilities patched as they're found most of the time? Running up to date software, is it a risk on a daily basis now, of course there could be unknown attacks, but you should be reasonably safe?
awesome31312 (OP)
Hero Member
*****
Offline Offline

Activity: 826
Merit: 504


View Profile
October 28, 2014, 11:43:15 AM
 #67

What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server.

What kind of information? Like passwords??

Account recovered 08-12-2019
novacn
Full Member
***
Offline Offline

Activity: 140
Merit: 100


View Profile
October 28, 2014, 01:52:46 PM
 #68

Sure, it's safe if you have a good habit.
If you don't, anything safe will eventually become unsafe.

Joe_Bauers
Hero Member
*****
Offline Offline

Activity: 802
Merit: 1003


GCVMMWH


View Profile
October 28, 2014, 03:36:08 PM
 #69

What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server.

What kind of information? Like passwords??

Like anything that you are sending to C.
A being you
B being MITM
C being your intended destination.
funtotry
Sr. Member
****
Offline Offline

Activity: 420
Merit: 250


Ever wanted to run your own casino? PM me for info


View Profile
October 28, 2014, 08:56:39 PM
 #70

What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server.

What kind of information? Like passwords??

Like anything that you are sending to C.
A being you
B being MITM
C being your intended destination.

In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Cryptowatch.com
Full Member
***
Offline Offline

Activity: 196
Merit: 103


View Profile WWW
October 28, 2014, 09:58:54 PM
 #71

In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Afaik, MITM attacks is non-trivial when communicating with end-to-end encryption. Clear text is entirely another matter, and is very risky.

For example, some activists have used TOR and thought they were safe, but still rogue exit nodes were able to read e-mails sent in the clear.
funtotry
Sr. Member
****
Offline Offline

Activity: 420
Merit: 250


Ever wanted to run your own casino? PM me for info


View Profile
October 28, 2014, 10:02:50 PM
 #72

In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Afaik, MITM attacks is non-trivial when communicating with end-to-end encryption. Clear text is entirely another matter, and is very risky.

For example, some activists have used TOR and thought they were safe, but still rogue exit nodes were able to read e-mails sent in the clear.
Many others thought the same was the case (myself included) however POODLE proved them wrong, as there is a vulnerability in certain protocols that is able to trick you into thinking that you are actually looking at a certain HTTPS site when you are in fact not

Cryptowatch.com
Full Member
***
Offline Offline

Activity: 196
Merit: 103


View Profile WWW
October 28, 2014, 10:15:21 PM
 #73

In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Afaik, MITM attacks is non-trivial when communicating with end-to-end encryption. Clear text is entirely another matter, and is very risky.

For example, some activists have used TOR and thought they were safe, but still rogue exit nodes were able to read e-mails sent in the clear.
Many others thought the same was the case (myself included) however POODLE proved them wrong, as there is a vulnerability in certain protocols that is able to trick you into thinking that you are actually looking at a certain HTTPS site when you are in fact not

I'm no expert, but is the POODLE still an issue? I would also think lots of intel agencies have groups working exactly with MITM attacks and other nefarious stuff.
ranochigo
Legendary
*
Offline Offline

Activity: 2982
Merit: 4193



View Profile
October 29, 2014, 12:12:14 AM
 #74

In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Afaik, MITM attacks is non-trivial when communicating with end-to-end encryption. Clear text is entirely another matter, and is very risky.

For example, some activists have used TOR and thought they were safe, but still rogue exit nodes were able to read e-mails sent in the clear.
Many others thought the same was the case (myself included) however POODLE proved them wrong, as there is a vulnerability in certain protocols that is able to trick you into thinking that you are actually looking at a certain HTTPS site when you are in fact not

I'm no expert, but is the POODLE still an issue? I would also think lots of intel agencies have groups working exactly with MITM attacks and other nefarious stuff.
I don't think so. Even bitcointalk have fixed SSL3 vulnerability. New updates in browser would have them fixed. Tor have released a update fixing it long ago. But still, there may still be vulnerabilities that have yet been uncovered.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
grumpyoldtroll
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
October 29, 2014, 05:54:17 AM
 #75

The only way to be anonymous on the internet is to not be on the internet Wink

Lol  Grin... But it's true...

So if you are going to use that in bitcoin, you need to have an offline wallet?
Joe_Bauers
Hero Member
*****
Offline Offline

Activity: 802
Merit: 1003


GCVMMWH


View Profile
October 29, 2014, 12:47:19 PM
 #76

What's an MITM sir? Kindly elaborate it please.
MITM is Man In The Middle (attack) it intercepts your traffics with the website and have the potential to collect the information you sent to the server.

What kind of information? Like passwords??

Like anything that you are sending to C.
A being you
B being MITM
C being your intended destination.

In your example it could also be anything that C would return to you (information) as when you login to a website when being subjected to a MITM attack, the MITM could send the same information you send to C and then forward you the information that it gets back from C until C send them (under the impression that the MTIM is you) the information they are looking for

Right, I should have clarified that as sending and receiving to/from C
awesome31312 (OP)
Hero Member
*****
Offline Offline

Activity: 826
Merit: 504


View Profile
October 29, 2014, 02:23:57 PM
 #77

I just talked to an anonymous user on Silk Road via TOR, and he explained how to carry out such an attack. It seems that it is network based, which means the best way to remain anonymous on the internet is to simply not get in anyone's way. There are numerous users who can maintain their anonymity because they don't screw with the wrong people. DPR was busted because he operated Silk Road.


Account recovered 08-12-2019
catena5260
Sr. Member
****
Offline Offline

Activity: 476
Merit: 501


View Profile
October 29, 2014, 02:29:35 PM
 #78

Satoshi remains anonymous even after his email got compromissed

Just mimic his behavior


Also it is said he used to use Tor
awesome31312 (OP)
Hero Member
*****
Offline Offline

Activity: 826
Merit: 504


View Profile
October 29, 2014, 02:47:37 PM
 #79

Satoshi remains anonymous even after his email got compromissed

Just mimic his behavior


Also it is said he used to use Tor

His email wasn't compromised, some kid used a spoofer to make it look like he had access to the email address

Account recovered 08-12-2019
Pages: « 1 2 3 [4]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!