Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Anonym.OS a Boon for Privacy Geeks? 403

The Hosting Guy writes "Wired is running an article about a live CD that makes anonymous browsing easy enough for everyone. 'So easy to use you can hand it to your grandmother and send her off on her own to the local Starbucks.' Anonym.OS makes extensive use of Tor, the onion routing network that relies on an array of servers passing encrypted traffic to permit untraceable surfing."
This discussion has been archived. No new comments can be posted.

Anonym.OS a Boon for Privacy Geeks?

Comments Filter:
  • by Anonymous Coward on Monday January 16, 2006 @07:30PM (#14486538)
    Since Slashdot bans most Tor proxies from making comments. Perfect for geeks, eh?
  • by Anonymous Coward on Monday January 16, 2006 @07:37PM (#14486593)
    Anonymizing yourself isn't a crime or probable cause for any kind of search warrant.
  • by Anonymous Coward on Monday January 16, 2006 @07:41PM (#14486625)
    ... yet.
  • by Rosco P. Coltrane ( 209368 ) on Monday January 16, 2006 @07:44PM (#14486651)
    Anonymizing yourself isn't a crime or probable cause for any kind of search warrant.

    In police states, someone who wants to be anonymous deviates from the norm and automatically becomes suspicious, as The Man considers that if you're not guilty, you have nothing to hide.

    In US-PATRIOT USA, I'm not sure I'd want to participate in the Tor network. I'm definitely not the only one. Perhaps I'm a coward, but that should tell you something of what this country is slowly turning into...
  • Re:Privacy Geek (Score:5, Insightful)

    by DogDude ( 805747 ) on Monday January 16, 2006 @07:51PM (#14486697)
    Has the will to un-molestation finally passed out of mainstream?

    There's a big difference between not wanting the government to tap your phone and not wanting web sites to put a cookie on your PC. The latter is a "privacy geek" thing, and yes, that level of privacy is fringe.
  • Kinda' (Score:2, Insightful)

    by DogDude ( 805747 ) on Monday January 16, 2006 @07:54PM (#14486718)
    Not really true is you're using TOR and a proxy. It'd be hard as hell to trace. But maybe so if you're running a TOR server (an outlet for other people's anonymity). That's why there are a hell of a lot more TOR users that don't also run servers. That's also why TOR is virtually unuseable (it's dial-up speed, when it doesn't time-out altogether).
  • by shumacher ( 199043 ) on Monday January 16, 2006 @07:54PM (#14486723)
    Yes. Use encryption. Encryption in your email client, encryption in your browser. Tor does this, but so does https and ssl.
  • by ivoras ( 455934 ) <ivoras@nospaM.fer.hr> on Monday January 16, 2006 @08:00PM (#14486766) Homepage
    I'm not an expert in anonymizing, but: to receive any information (really *any* - network packets, postal packages, etc.) efficiently, you have to have a unique address, and the party that sends the information must know it. Therefore, the path of that information can be tracked.

    The only way I see to guarantee anonymous receiving is some kind of broadcast - for example as exists with satellite downloading systems: the information is always broadcast by the satellite to a really wide area, in which any party can receive it (and discard it if it's not meant for them to have it) without the abbility to detect who and where has received it. The reason this scheme works is because satellite receiving is a "read only" system - the receivers are passive and don't send information to satellites, they only filter the received content (i.e. channels or download streams). This could be useful with a public key encryption scheme.

    (btw. the way satellite downloads currently works is that the receiver must have a separate "ground" line to a regular ISP that's used to send requests to the satellite company to broadcast the desired information, so there's still a traceable line, but in one direction only)

  • by Anonymous Coward on Monday January 16, 2006 @08:06PM (#14486808)
    You have the right to pamphlet anonymously. You have the right to use the internet to do it. You should be able to criticize the government without worrying about anyone getting revenge on you. I totally agree that the Patriot act goes way too far. By removing our basic freedoms, George W. has given the victory to the terrorists. We should be fighting to preserve our freedoms, not giving up our freedoms to fight the terrorists.

    The fact that a bunch of sickos use this technology to be perverted does not mean that the rest of us should not use it. If you care about your freedom and you don't like what is going on then you can use it to safely make your complaints heard.
  • by HTL2001 ( 836298 ) on Monday January 16, 2006 @08:06PM (#14486810)
    yes.

    Think about it this way:
    HTTPS etc encrypt your data before it is sent to the wireless card
    WPA/WEP encrypts the data as its recieved on the wireless card, then transmits it

    not quite right but basicly, HTTPS encrypts data before it would be encrypted for WPA wireless.
  • by tdvaughan ( 582870 ) on Monday January 16, 2006 @08:13PM (#14486865) Homepage
    That's because people use Tor to troll Slashdot. Makes me glad I have more than one IP on my ADSL line - I can use one for my Tor node and another for posting to Slashdot.
  • Re:Privacy Geek (Score:4, Insightful)

    by poot_rootbeer ( 188613 ) on Monday January 16, 2006 @08:16PM (#14486891)
    Has the will to un-molestation finally passed out of mainstream?

    Funny you should mention "molestation", because guess what behavior Big Brother is going to cite when they crack down on anonymous Internet proxying?

    I value my privacy and will fight tooth and nail to preserve it. However, "privacy" and "anonymity" are not the same thing.

    My home is private. My computer is private.
    Anything I do outside of my home, whether I travel via foot or via wire, is public and there's a possibility that I may be seen or even recognized.
  • un-molestation (Score:5, Insightful)

    by rodentia ( 102779 ) on Monday January 16, 2006 @08:17PM (#14486896)

    The idea that one might live one's life in private and without fear of molestation is a *very* recent phenomenon. It's not passing out of the mainstream, it never quite arrived there.

    The right to privacy is a post-war interpolation from the set of Constitutional rights. It was hardly a consideration before single-family households became common beyond the elite classes consequent to industrialisation. The very idea of private life took meaning from the distinction to be drawn between the public and private duties of the landed gentry, whether he was acting as public judge or administrator of his chattel. The idea that citizens required more privacy than that demanded by Christian modesty simply did not occur. It is only in the last generation that anyone became actually interested in the details of your private life. Before the information age, such trivia had no value beyond the prurient, of interest only to busibodies and the beat cop; again, unless you were a name.

  • by poot_rootbeer ( 188613 ) on Monday January 16, 2006 @08:21PM (#14486918)
    So does anyone know just how much porn there is on the internet?

    All of it?

    I'm looking for hard statistics cause most "normal" people don't get it when I refer to my connection as a "porn pipe".

    Have you tried wearing pants?
  • by dubl-u ( 51156 ) * <.ot.atop. .ta. .2107893252.> on Monday January 16, 2006 @08:35PM (#14487006)
    That's because people use Tor to troll Slashdot.

    Anonym.OS: the OS of choice for privacy geeks and serious assholes.

    <ironic>If only we could implement some compulsory registration for Tor, everything would be fine!</ironic>

    To my mind, that's the problem that all of these anonymous computing efforts fail to solve: a lot of people use anonymity to be jerks. When I look at the traffic my sites get from open proxies, a vanishingly small percentage is from political dissidents; most of it is from turd-in-the-punchbowl fuckheads.
  • Re:Privacy Geek (Score:3, Insightful)

    by whoever57 ( 658626 ) on Monday January 16, 2006 @08:37PM (#14487019) Journal
    Anything I do outside of my home, whether I travel via foot or via wire, is public and there's a possibility that I may be seen or even recognized.
    So you don't think warrants are required for any phone taps?
  • by drix ( 4602 ) on Monday January 16, 2006 @08:46PM (#14487068) Homepage
    Yes, to track a tor session from server to end-user is theoretically possible. Guess what? So is time travel. The confluence of circumstance and technology needed to make either one actually happen make them practically impossible. I don't know tor all that well, but I'd be damn surprised if they did any sort of connection logging whatsoever. So, your quest ends at hop one unless you've managed to root that box. I don't know tor all that well, but I'd be damn surprised if they were bouncing each conn off < N boxes, where N is probably greater than 5. So you'd need to root say 5 boxes. I don't know tor all that well, but I'd be damn surprised if the routes were not randomized from connection to connection. So, you'd need actually need to root pretty much the entire network, or some large subset of it.

    I don't know what your personal odds of pulling that off are, maybe you are more 31337 than I, but I'm estimating that the probability is, say, Planck's constant (scalarized, of course.) For the government, we'll give them about 15 orders of magnitude greater... inverse of Avogadro's number, perhaps. Or maybe the Hartree energy constant, if I'm feeling really generous.
  • by Concerned Onlooker ( 473481 ) on Monday January 16, 2006 @08:50PM (#14487087) Homepage Journal
    but the real thing you're doing is plastering a big "I have something to hide, like trading kidding porn" sign to anybody willing to trace your communications in the first place.

    So true. In fact, I would suggest that you stop using envelopes when mailing letters and just use postcards instead, that way everybody along the way can read them much more easily. You don't have anything to hide, do you?

    No real reason for secret ballots either, now that I think about it. After all, you're not attemting to make an illegal vote.

    The police ought to be able to search your house at will, too. If you're not doing anything wrong you have nothing to fear, right?

    Oh, remember that sooner or later if you stop defending your freedoms you lose them. When it becomes illegal to criticize the government and you say "but that wasn't what I meant" it's just a tad too late.

  • Re:un-molestation (Score:3, Insightful)

    by ClamIAm ( 926466 ) on Monday January 16, 2006 @08:53PM (#14487103)
    The right to privacy is a post-war interpolation (sic) from the set of Constitutional rights.

    I don't see how "unresonable search and seizure" and "no troops shall be quartered in private homes" can really be interpreted in any way other than "leave me alone, unless there's a legitimate reason". Some links to research backing up your assertions would be nice.

  • by LocalH ( 28506 ) on Monday January 16, 2006 @09:03PM (#14487175) Homepage
    How about this: You show me the section which explicitly denies a right to privacy. Can't do it? Then you lose.
  • Re:un-molestation (Score:3, Insightful)

    by Elemenope ( 905108 ) on Monday January 16, 2006 @09:07PM (#14487206)

    Actually, grandparent is basically correct; what you are forgetting is that the primary concern of citizens during most of our history is insulation against state power, and the Third and Fourth Amendments are restrictions specifically upon the power of the state to intrude substantially into the personal private sphere.

    It would not have occurred to anyone for any time except basically our own (with our historically unique communications and information extraction and analysis tools) that the private information of any individual citizen reaqlly needed positive protection. Remember that the only agnecy that could violate that private sphere effectively (the government) was already fairly well-restricted; that the common person's private info has a paramount economic value is a very new concept.

  • Re:Privacy Geek (Score:2, Insightful)

    by Apathist ( 741707 ) on Monday January 16, 2006 @09:27PM (#14487312)
    So you don't think warrants are required for any phone taps? Actually, that is a bit of a simplification. Wire taps are used to listen in to essentially private conversations between people who are expected to be friends/collegues/etc, hence the assumption of privacy.

    On the other hand, wandering the public internet is akin to strolling in the park or mall, where one would not expect privacy to be guaranteed... and the officers of the Ministry of Love happily exploit that expectation.
  • by Travoltus ( 110240 ) on Monday January 16, 2006 @09:42PM (#14487375) Journal
    That's the remaining gotcha that can reliably get you ID'd.
  • Re:Privacy Geek (Score:3, Insightful)

    by PoopMonkey ( 932637 ) on Monday January 16, 2006 @10:06PM (#14487485)
    On the other hand, wandering the public internet is akin to strolling in the park or mall, where one would not expect privacy to be guaranteed... and the officers of the Ministry of Love happily exploit that expectation.

    The problem with this statement is that not all activity on the internet is like strolling in the park or mall. Many times activity on the internet is exactly like a phone call, a communicatin between friends/colleagues/etc. For instance, email or instant messaging. If you post something on a forum such as slashdot, however, in that case it's in the public.
  • Re:un-molestation (Score:2, Insightful)

    by Anonymous Coward on Monday January 16, 2006 @10:07PM (#14487497)
    The idea that one might live one's life in private and without fear of molestation is a *very* recent phenomenon. It's not passing out of the mainstream, it never quite arrived there.
    While I will agree that until very recently most people lived a very communal life, with very limited privacy... I don't think that kind of lack of privacy compares at all with what we're facing today.

    In the past, you shared much of your life with the community around you... Your friends and family in a relatively small town. Most people lived with very large families, in very small homes. There were precious few secrets, and very little privacy. But the information you shared with others was all personal... It was a shared existance. The reason people knew all your secrets is because they were there with you when it happened. They knew about the embaressing thing that happened at your last birthday party because they were there. And they also knew enough about you not too judge a single failing too harshly.

    Today we've got massive databases storing up interesting bits of information gleened from all over the world. Impersonal corporations are trolling through our garbage looking for anything they can use to sell us something new. This isn't your next-door neighbor or your aunt overhearing some private exchange...this is a willful invasion of your privacy by someone completely un-connected to you.

  • Re:Privacy Geek (Score:4, Insightful)

    by c_forq ( 924234 ) <forquerc+slash@gmail.com> on Monday January 16, 2006 @10:10PM (#14487510)
    I think if you have a letter in an envolope, you have phone line encrypteded (or if it is a line not connected to the larger standard grid), or you are using encryption/SSL on the internet you can expect protection from warrentless searches and privacy. But I don't think you should always expect a phone conversation to be private (it is insanely easy for someone else inside the same house/building to pick up onto the same line) especially wireless or cell phones (you can listen to cell phone conversations with $30 worth of gear from radioshack). Likewise with the amount of servers your queries may run through I don't think you should expect privacy on the internet. And with a unsealed letter you shouldn't expect that no one will read it (like a post-card).

    I qoute the 4th ammendment:
    The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

    Searching and seizing needs to be limited to private places and things, otherwise police can't arrest anyone anywhere without a warrant or confiscate drugs in public parks.
  • Re:Privacy Geek (Score:5, Insightful)

    by Jelloman ( 69747 ) on Monday January 16, 2006 @10:13PM (#14487515)
    On the other hand, wandering the public internet is akin to strolling in the park...
    (pretending that's not a troll...)

    The Internet being "public" is your assumption. You infer it, but it's certainly not implied.

    The Internet is designed as an end-to-end architecture. AKA point-to-point, which is exactly what the telephone system is. It's not inherently designed to be public or private, but the end-to-end architecture certainly enables truly private communication (assuming the continuing existence of encryption technologies not broken or illegal), and to me it strongly suggests that, given demand, it should be a feature of most Internet applications. Which it sort of is, if you don't count security (i.e., my email and IM and web surfing is private, but that privacy is usually not very secure.)

    Ultimately, the Internet with private communication is ten times as useful as the one without it. Maybe a thousand times. Hell, given the cultural impact, you can't measure the difference at all. It leads to two very different worlds.
  • Re:Fringe Group (Score:5, Insightful)

    by ONU CS Geek ( 323473 ) <ian.m.wilsonNO@SPAMgmail.com> on Monday January 16, 2006 @10:40PM (#14487613) Homepage

    The fact that this score has an Insightful Moderation is scary...I've got Karma to burn, so let me speak my mind.

    We should have a reasonable expectation of privacy in our everyday lives, even if the constitution doesn't have a "de facto" privacy clause in it. Remember that crazy court Case Roe v. Wade? The court didn't say that "abortion was legal," the Court declared that laws prohibiting abortion represented a violation of a women's right to privacy. While the right to privacy does to exist as such in the Constitution it has long been interpreted to exist as an umbrella created by the first 5 amendments in the Bill of Rights.

    To be quite honest with you, I know cops who have problems with the way that today's society is going. They don't want to have to worry about carrying an ID when they're walking down the street to buy a gallon of milk. (HIIBEL V. SIXTH JUDICIAL DIST. COURT OF NEV.,HUMBOLDT CTY. (03-5554) 542 U.S. 177 (2004) 118 Nev. 868, 59 P.2d 1201, affirmed. [cornell.edu])

    It really bothers me in a multitude of ways that our civil liberties are being torn down under the guise of terrorism. It really bothers me that many people are letting their guards down and just allowing these rights to just be walked on like nothing matters. Is it just me or am I the only one who sees a problem here?

  • by maxpublic ( 450413 ) on Monday January 16, 2006 @10:42PM (#14487618) Homepage
    That's because people use Tor to troll Slashdot

    People use *their own accounts* to troll Slashdot as well, not to mention regular AC posts. How the fuck is using Tor any different?

    Max
  • by maxpublic ( 450413 ) on Monday January 16, 2006 @10:54PM (#14487683) Homepage
    Information wants to be free, deal with it.

    Information doesn't want shit, deal with it.

    Max
  • Re:Privacy Geek (Score:0, Insightful)

    by Anonymous Coward on Monday January 16, 2006 @11:01PM (#14487717)
    So you don't think warrants are required for any phone taps?

    In the USA with that GWB madman on the loose and in control?

    No.

    Haven't you been watching the news? He wouldn't know what a court order was if he were slapped one for high treason.

  • by Anonymous Coward on Monday January 16, 2006 @11:05PM (#14487736)
    Who were the first people to be arrested and killed by the Nazis?
    I realize you're an abstract AmeriKwan, but please don't conflate Nazis with the Bolsheviks [parks.lv]; the latter of whom pointedly killed productive members of society as "politically unreliable" and "bourgeois."
  • by dominion ( 3153 ) on Monday January 16, 2006 @11:47PM (#14487924) Homepage
    The so called "anarchists" get all over the news acting like total fuckwads at WTO "protests".

    As an anarchist [infoshop.org], somebody who was at the WTO protests, and someone who strongly supports online privacy and the cypherpunk perspective, I'd like to ask what the hell you're talking about?

    The WTO protests was one of the biggest events of the late 20th century, it was part of a snowballing effect against corporate globalization which stretched from all points on the globe, and culminated in events such as the uprisings in Argentina and the Zapatista march on Mexico City.

    In what way are the WTO protests, which were centered around deconstructing corporate control of our lives, including information and it's free flow, counter to the cypherpunk position?
  • by fm6 ( 162816 ) on Tuesday January 17, 2006 @12:29AM (#14488087) Homepage Journal
    The OED, ooh! Wish I could afford access to it. But my M-W says the same thing. And I did mention there was nothing special about putting the two words together.

    What makes you think the public doesn't take privacy seriously? Try getting caught peeking in somebody's bedroom window, and you'll find out how serious most people are about their privacy. It's just that for most people don't need the level of privacy that the Tor Network provides. Someobdy goes to that much trouble to obfuscate their internet traffic definitely deserves to be called a "geek".

  • by aaronl ( 43811 ) on Tuesday January 17, 2006 @01:55AM (#14488407) Homepage
    You're reading it out of context.

      "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

    This means that the government is outright forbidden to conduct unreasonable search and seizure. It also forbids unsubstantiated warrants to be issued. It allows the government the ability to issue warrant, search, or siezure when there is good reason that is supposed under oath and to an exact place, person, or thing. That is quite a narrow power!

    With the way the Constitution is written, this is supposed to mean that the government can do those things *only* under that exactly described set of conditions. That inspector that you're talking about, by the Constitution, would require a court supported warrant to a specific place to do a search. The reason of "someone said this bad thing was happening" is insufficient, because you cannot state, under oath, that "bad thing" is happening, unless the person saying that it is can affirmatively testify to the occurrance of "bad thing".

    I recognize that things aren't working that way at the moment, but that is what the Constitution *says* is supposed to be going on.
  • Re:Privacy Geek (Score:5, Insightful)

    by adolf ( 21054 ) <flodadolf@gmail.com> on Tuesday January 17, 2006 @02:19AM (#14488474) Journal
    ...there is also the possibility that, while outside of your home, you might elect to wear a mask or makeup, in a deliberate attempt to disguise your identity. You might also speak softly, or with a characteristically different voice, or in a different language. You could carry cash, instead of credit cards or checks.

    Nothing wrong with any of that, even if it does look a bit out of place to those around you.

    Now then, I might elect to use Tor, PGP, S/MIME, OpenVPN in a deliberate attempt to disguise my identity.

    And there's nothing wrong with that, either.

    The notion that I might be conducting myself "in public" does not require me to wear my secrets on my shirtsleaves.

  • Problems with Tor. (Score:3, Insightful)

    by crhylove ( 205956 ) <rhy@leperkhanz.com> on Tuesday January 17, 2006 @06:59AM (#14489261) Homepage Journal
    I love the IDEA of Tor. I also love the idea of FreeNet. Neither one seems to work at all well (or quickly) in their current iterations however. Until these things are solved, for most people the trade-offs are just not worth it. Especially when so much is achievable under the mere guise of the millions of people involved. Until the RIAA hires MILLIONS of lawyers to sue MILLIONS of customers per year, people won't mind thumbing their nose at them and playing the numbers game. The same is CERTAINLY true for surfing and IM.

    rhY
  • Re:TOR (Score:3, Insightful)

    by TCM ( 130219 ) on Tuesday January 17, 2006 @07:37AM (#14489362)
    An important thing to note is that Tor provides IP-based anonymity, not privacy. It _only_ helps to hide your IP address. If you send the password for your anonymous e-mail account in cleartext, the last node can intercept it. Actually, when I was running a Tor node, I sniffed people's traffic to see what they were doing. That didn't help me know _who_ the person was, unless he posted his name in cleartext somewhere. This is something you should expect. Tor nodes are random people with unknown interests. That someone is running a Tor node does not mean they don't look at the data you send.

    I'll say it again: the encryption in Tor does _not_ hide your payload. It only serves to hide your IP address.

    If you use Tor, use encryption on the upper layer.
  • Trusted binaries ? (Score:3, Insightful)

    by pan_sapiens ( 647704 ) on Tuesday January 17, 2006 @08:49AM (#14489560) Homepage
    While the intent of this project is very good, and I hate to pick holes ....here's one for the ultra-paranoid:

    Do you trust the precompiled binaries on the livecd ?

    Sure, the OpenBSD source is available for you to comb over for backdoors & sniffers etc, but how do you know that Anonym.OS was compiled using that exact same source code ?

    Maybe comparing hashes of the binaries to the offical OpenBSD versions would be a good start, but there are various reasons why this will only get you half way to validating that the build is kosher

    I'm not even beginning to suggest this work is trojaned or anything - the last thing I want to do is spread FUD about something this cool and useful ..[whoops, maybe too late], but this is a significant problem that I've come across personally when considering a "privacy" geared livecd. You place a lot of trust in the person(s) packaging the distro unless you pretty much compile the whole thing yourself.

    One solution (which is very time consuming, and already dated), is the Trusted Build Live CD [sourceforge.net] (TB) by the Hacktivismo group. It is basically a cookbook for rolling your own Gentoo livecd, with some tailoring for anonymity related applications like Tor (AFAIK, it doesn't do the nice packet filtering that Anonym.OS does, however).

  • by XMilkProject ( 935232 ) on Tuesday January 17, 2006 @03:18PM (#14492676) Homepage
    Taking it to Starbucks, (at least where I live) means using Wifi. It really isn't possible they've implemented usable Wifi support in their LiveCD is it? Usually getting wireless to work on linux means finding windows drivers, utilizing NDISWrapper, etc.

    That being said, what would be required for the linux community to make Wifi drivers more accessible? Is this something that is reliant entirely on the manufacturers providing drivers or is there some other solution? It would surely aid linux adoption if it was easier to get your Laptop Wifi working.

    For the linux-savvy, NDISWrapper is of course very slick, and I was able to get my HP Notebook Wifi card working in about 20 minutes, but the less techy people such as the Grandmother mentioned in the posting are not going to be able to sort their way through ndiswrapper and iwconfig, much less figure out newer encryption methods.
  • by elrous0 ( 869638 ) on Wednesday January 18, 2006 @10:45AM (#14499230)
    Nobody would take a protest like that seriously.

    Yeah, that's probably [life.com] true [africanamericans.com].

    -Eric

"Kill the Wabbit, Kill the Wabbit, Kill the Wabbit!" -- Looney Tunes, "What's Opera Doc?" (1957, Chuck Jones)

Working...