Jump to content

Xeon

Active Members
  • Posts

    7
  • Joined

  • Last visited

Profile Information

  • Gender
    Male
  • Location
    London
  • Interests
    bufferoverflow.co.uk

Recent Profile Visitors

659 profile views

Xeon's Achievements

Newbie

Newbie (1/14)

  1. V nice. I make someone similar with RPi, rtl-sdr, homebrew 1090Mhz half-dipole and dump1090. I was feeding flightrader24.com with data for about 6 months before I found another use for the pi. Love to see these homebrew jobs :)
  2. Xeon

    Keybase

    I came here to ask the same thing. Anyone have a spare invite kicking around? Been on the waiting list for private beta for about 3 months now.
  3. In the UK we do have laws regarding the photographic depiction of sexual violence. I cant speak as to why possession of certain images in criminal but photographs of a crime is evidence of that crime and withholding it from authorities is a crime so either way you get busted.
  4. I imagine the reason Hak5 dont use ssl is a mixture of processor overhead and cost of the certificate. As for the SSL stuff, there is no need to break SSL if you can subvert it. I havn't seen SSL 256bit key broken, but then I dont work in IT. Im shall we say...a hobbyist :)
  5. Very hard to detect a sniffer in promsic or monitor mode. Only ways to stop a sniffer is local encryption. If a MITM is happening then latency can be used to detect (think mtr). Arpspoofing is easy to detect since it's noisey as fuck. Encrypt using: Darknet VPN SSH to remote VPS (poor mans vpn) SSL end to end (kinda screwed thanks to moxie's SSLstrip and similar tech) We can wait for DNSSEC to be fully implemented which will help prevent DNS cache poisoning but Im not sure this will help with securing SSL. If companies like komodo keep getting away with being compromised then SSL isnt worth the bits it's made from. If you are serious about securing your data then no free VPN and no untrusted proxies! Tor is fine but remember a certain % of your data goes to the NSA. My solution is SSL and SSH for privacy. Tor for anonymity. Mix and match depending on what you're doing.
  6. Traffic is encrypted as it passes through your node so nobody can view it. If you are an exit node you can of course sniff the interface (a la NSA) and see the traffic but law enforcement is aware of Tor and how it works. Watch Jake Appelbaum and Roger Dingledine at CCC kongress (29C3 i think) and they explain that because all tor exit nodes are known to the network they already have a list of exit nodes and can look it up before knocking down a door. Another point they make is that failure of law enforcement to check if they person is running an exit node could in fact work against them in court, though I really wouldnt want to be the test case... As for the whole child porn argument, I think the technology is fundamentally awesome and necessary in the current police-excessive world, not to mention it fucks nicely with google and facebook market profiling. Of course people will abuse the technology but it isn't the tech that is bad, to massively simplify it, it's bad people using tech. Also in response to a previous post, I would imagine the fact that someone had CP on their computer would imply that person was complicit in the sexual abuse of that child, which is deplorable in my opinion. I would point out however I am not a lawyer and I hope much smarter people than me work in the judiciary...
  7. If you plan to run an exit node from anywhere it's best to contact your ISP and see what their policy says about it. You might find they block certain ports (e.g. 9001) which Tor uses by default or they may disconnect you for ToS violation. Assuming they are unconcerned you can then set up and hope the cops don't show up. Here in the UK there was some interest by law enforcement but no raids that I know of. Australia, Austria and Germany have seen raids on exit node operators. I have run a Tor relay (non-exit node) for a couple of years and my ISP hasn't cared (as far as I know). If you have a server then running an exit node is a great thing to do if you don't mind the possibility of a bit of hassle and if you want to avoid any kind of hassle then I would urge you to run a relay (or many). Given that all traffic is encrypted and you can run it over port 443 it is a little hard to identify as Tor and I'm sure most ISPs couldn't care less. Warning note: the default Tor config is set up to work as an relay AND exit node. Just change the Exit Policy to REJECT *.* in torrc file to only relay traffic.
×
×
  • Create New...