(Actually, nothing changed.
One post got through without problems, for some reason.)
Edit: In the time it took to write this, something seems to have changed. I’m not yet sure; but this is my first post in some hours which was not quasi-eaten, etc.
If theymos twiddled some knobs—thank you. If not—then for future reference, I want it somehow known that occasionally, if Cloudflare is busy valiantly stopping a DDoS attack, I might become unavailable on the forum due to denial of service.
Cloudflare is an anti-user D.o.S., Denial of Service! It is currently making the forum unusable through Tor. “Unusuable” meaning, to a reasonable person; I am sometimes unreasonably stubborn.
It repeatedly hits my browser with Javascript checks, re-checks,
Rapiscans porno-scans, X-rays, and cavity searches which spin my CPU, eat up my RAM, and do who-knows-what else. It does this so frequently that because I spend significant time on posts, I am regularly directed to a blank form which even forgets which thread I’m trying to reply in.
My posts would be eaten, and lost forever if I didn’t have a copy set aside outside the browser.If I weren’t so fond of this forum and already quite invested in it, I would have given up three hours ago.
Please do something about this! I suggest starting by immersing DDoS attackers in boiling oil. I am fantasizing about that right now. But really, if you’re going to get DDoSed, DoSing your users is not the solution.
No, vmware is not open source, but over my 10 years of using it (like in enterprise envs), I have never had any issue or security problem.
How do you know that? The type of attacks which break out of VMs are not typically used by the authors of popular widespread malware.
OFC,Nothing is completely secure in this day and age as you know I'm sure.
You may be assured, I would not allege “open source” to be a security panacea! The magical security of open source is a pernicious and contemptible myth. Availability of source code is only a prerequisite which facilitates auditing. When actual people (as opposed to hypothetical eyeballs) are auditing the source, the next step is reproducible builds, as Core does.
But the availability of source code provides the potential. Intentionally opaque blobs do not.
vmware is not open-source but there are open-source hypervisors... like linux kvm or whatever-the-fuck it's called nowadays.
Xen: Bare-metal hypervisor, but more or less married to Linux for dom0 (last I checked)
KVM: Linux thing
Bhyve: FreeBSD thing
VirtualBox: Mostly open-source thing.
qemu: Not a VMM per se; but I feel it deserves mention here.
Am I forgetting any popular ones?
I don't quite get the issue with fingerprinting. You can fake nearly everything about your environment in a VM. Screen resolution, browser type/version, OS type, VPN endpoints, not sure what else is there that JavaScript could potentially disclose?
Zeroth of all, do you fake all these things
separately each time you hit the “New Identity” button? And how many combinations thereof could you reasonably make? The
most urgent concern is not preventing identification of your computer: It is preventing
linkability of your browsing sessions.
And first of all, some things can reveal quite hardware-specific information. Reading from <canvas>. webgl. Many others, because browser makers are idiots who add stupid new features willy-nilly (
or may want things this way). Some of these are disabled or limited in Tor Browser. But you said VPN—actually, if you use an ordinary browser with a VPN, you are pretty much toast anyway for fingerprinting.
How about CPU timing? The Javascript language provides sufficient resolution to make this a fingerprinting issue. (Tor Browser limits the resolution, but not enough IMO.)
How about the fact that—well, correct me if I’m wrong, but I doubt that VMware lets you conceal the fact that you are running in VMware. It probably leaks the version, too! ESXi, did you say? Is my brain half-melted by the heat of Cloudflare spinning my CPU, or is ESXi some kind of server stuff which is
very rare for end-users? Ooh, 23.8 bits of suchmoon identification!
(In a related matter: When I started searching for privacy leaks, I found some very unpleasant surprises in my kernel. Don’t get me started. It is astonishing how much uniquely identifying hardware info can be easily scooped up by heavily sandboxed unprivileged processes. How do you do your Tor daemon?)
Note: I am not even up right now on all the latest research. I
have seen some tantalizing discussions of fingerprint attacks which will turn your whole browser into a supercookie to link your sessions.
From there, the concept is simple: suchmoon on bitcointalk.org = xyz on abc = [your so-called “real name”] who lives at [address], according to that non-Bitcoin online shopping you just did. Oopsie!
Re drafts - e.g. if I open a VM for Bitcointalk I will probably use it for a few days so good enough for me although TBH I'm not into long essays. Sometimes when I need to save it for longer I send it in a PM to myself.
PMs here are a disaster, in my opinion.
Feature suggestion for a “crypto” forum: An opt-in remailer, which would let me send mail to suchmoon@users.bitcointalk.org—or maybe 234771@, since usernames here can contain charcters which are problematic. (Problematic, despite being allowed by the original RFC 822.) Spam could be curtailed by requiring SMTP envelope FROM the registered e-mail address, and obeying SPF records, etc.
That way, I could use the very convenient PGP functionality of my mail client. Plus its drafts box.I should start a new Meta topic. Watch for it.