Bitcoin Forum
November 16, 2024, 07:58:15 PM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: DPI  (Read 2034 times)
subSTRATA (OP)
Legendary
*
Offline Offline

Activity: 1288
Merit: 1043


:^)


View Profile
December 06, 2012, 10:28:16 PM
Last edit: August 10, 2013, 11:41:03 AM by subSTRATA
 #1

"."

theres nothing here. message me if you want to put something here.
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
December 06, 2012, 10:49:24 PM
 #2

Govts control ... that is what they do ... that is all they do.

Then again you can't deep packet inspect an encrypted packet.

Deep Packest Inspector "Hmm I deeply know this packet is still encrypted".
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
December 06, 2012, 11:54:33 PM
 #3

No I am sure on that.
mcgravier
Member
**
Offline Offline

Activity: 83
Merit: 10


View Profile
December 07, 2012, 03:47:28 PM
 #4

If this goes on, internet gonna be renamed as in-TOR-net.
spiccioli
Legendary
*
Offline Offline

Activity: 1379
Merit: 1003

nec sine labore


View Profile
December 07, 2012, 07:42:36 PM
 #5

No I am sure on that.

Death&Taxes,

next step will be stopping every packet that cannot be deeply inspected ...

spiccioli

casascius
Mike Caldwell
VIP
Legendary
*
Offline Offline

Activity: 1386
Merit: 1140


The Casascius 1oz 10BTC Silver Round (w/ Gold B)


View Profile WWW
December 07, 2012, 07:45:08 PM
 #6

No I am sure on that.

Death&Taxes,

next step will be stopping every packet that cannot be deeply inspected ...

spiccioli



Next will come steganographic streaming algorithms that look like mpeg but carry unidentifiable encrypted data.

Companies claiming they got hacked and lost your coins sounds like fraud so perfect it could be called fashionable.  I never believe them.  If I ever experience the misfortune of a real intrusion, I declare I have been honest about the way I have managed the keys in Casascius Coins.  I maintain no ability to recover or reproduce the keys, not even under limitless duress or total intrusion.  Remember that trusting strangers with your coins without any recourse is, as a matter of principle, not a best practice.  Don't keep coins online. Use paper or hardware wallets instead.
spiccioli
Legendary
*
Offline Offline

Activity: 1379
Merit: 1003

nec sine labore


View Profile
December 07, 2012, 08:28:05 PM
 #7

No I am sure on that.

Death&Taxes,

next step will be stopping every packet that cannot be deeply inspected ...

spiccioli



Next will come steganographic streaming algorithms that look like mpeg but carry unidentifiable encrypted data.

casascius,

I'm not sure this would be feasible, how much data do you need to hide current blockchain inside it?

spiccioli
BladeMcCool
Member
**
Offline Offline

Activity: 83
Merit: 10


View Profile
December 08, 2012, 07:29:56 AM
 #8

No I am sure on that.

Death&Taxes,

next step will be stopping every packet that cannot be deeply inspected ...

spiccioli



Next will come steganographic streaming algorithms that look like mpeg but carry unidentifiable encrypted data.

casascius,

I'm not sure this would be feasible, how much data do you need to hide current blockchain inside it?

spiccioli


of course it's feasible. the point is that governments cannot stop the free flow of information no matter how hard they try. we will always find ways to route around the damage they try to cause.
Rudd-O
Newbie
*
Offline Offline

Activity: 56
Merit: 0



View Profile WWW
December 08, 2012, 08:31:18 AM
 #9


Then again you can't deep packet inspect an encrypted packet.


Of course you can.  DPI hardware has the capability to decrypt using phony certificates and then reencrypt.  You wouldn't even notice it happening, unless you have a browser extension that flagged those phony certs.  They have been doing this for YEARS already.
Insu Dra
Full Member
***
Offline Offline

Activity: 182
Merit: 100



View Profile
December 08, 2012, 12:58:03 PM
 #10


Then again you can't deep packet inspect an encrypted packet.


Of course you can.  DPI hardware has the capability to decrypt using phony certificates and then reencrypt.  You wouldn't even notice it happening, unless you have a browser extension that flagged those phony certs.  They have been doing this for YEARS already.

+1

SSL has become a joke and this will just hollow it out even further. Playing man in the middle was already easy for isp's, cloadflare was a nice beta test to scale this up and to get around specific tools that warned about possible false certificates.

More Info: http://perspectives-project.org/

Personally I removed all ca's from my browser and only trust certificates I add manually.

"drugs, guns, and gambling for anyone and everyone!"
Deafboy
Hero Member
*****
Offline Offline

Activity: 482
Merit: 502



View Profile WWW
December 08, 2012, 02:10:27 PM
 #11

Quote
Personally I removed all ca's from my browser and only trust certificates I add manually.
I am using certpatrol in FF instead, but with google's services it's useless. They has so many different certificates...
pyramining
Hero Member
*****
Offline Offline

Activity: 501
Merit: 500


View Profile
December 08, 2012, 02:16:03 PM
 #12

IPv6 should support IPSec natively, I am not an expert of crypto stuff, but to me it seems strong enough to prevent DPI. We should just use it.
CIYAM
Legendary
*
Offline Offline

Activity: 1890
Merit: 1086


Ian Knowles - CIYAM Lead Developer


View Profile WWW
December 08, 2012, 02:17:36 PM
 #13

In the soon to be released CIYAM open source project all sensitive content is encrypted over plain HTTP that is injected dynamically (think AJAX).

With the page calling for the injection being able to be formatted any way you like it should be very hard to determine what is going on unless they also plan to ban all dynamic HTML injection.

With CIYAM anyone can create 100% generated C++ web applications in literally minutes.

GPG Public Key | 1ciyam3htJit1feGa26p2wQ4aw6KFTejU
Insu Dra
Full Member
***
Offline Offline

Activity: 182
Merit: 100



View Profile
December 08, 2012, 02:20:29 PM
Last edit: December 08, 2012, 02:32:46 PM by Insu Dra
 #14

Quote
Personally I removed all ca's from my browser and only trust certificates I add manually.
I am using certpatrol in FF instead, but with google's services it's useless. They has so many different certificates...

Yha, there are some services that will simply not work when removing ca's or at least not within reason, they have to meany or dynamic certs (google being one of them idd). I just have a unsafe os setup to use those and keep things separated.

IPv6 should support IPSec natively, I am not an expert of crypto stuff, but to me it seems strong enough to prevent DPI. We should just use it.

It has the same issue, what certificate to trust ? Only if you manually add a certificate that you personally trust is it secure, any exciting type of dynamic/automated distribution creates holes.

"drugs, guns, and gambling for anyone and everyone!"
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!