(2010-06-17) The future of anonymizers

As you probably know, only crooks encrypt their network traffic. If you havent done anything wrong, you have nothing to hide from anyone Ever. Its not like anyone else would ever disagree on what is ok or that someone might use things out of context to discredit you. I mean you gotta trust your friends, neighbors and the government.

But enough about the fictitious world found in clueless peoples arguments and lets head back to reality. Being anonymous is a growing hobby for lots of people like you and me and dissidents who really want to avoid getting into trouble with the government. A hard learned lesson is how little protection you get from services promising total transparency.

The TOR network embassy scandal of 2007 proves this. 1] The principle of TOR is called Onion routing 2]. The idea is that every Onion router can only know about the last node the packet came from and the next node to which it must sent. But just because the government cant see you, doesnt mean the operators on the nodes themselves are blind as well. What happened was that Dan Egerstad, a Swedish security consultant, running an exit node in the TOR network started sniffing for clear text passwords going through the service. He then leaked the results.

A variant of Onion routing, known as Garlic Routing, tries to solve the problem of eavesdropping. The big change is that your traffic is split up over several routers, and transmitted in random bursts. An evil exit node will only get a scatter of mixed messages from a lot of different people and will have a much harder time trying to analyze the traffic patterns or reading the content.

Another thing people forget is that the size of the encrypted traffic matches the size of non-encrypted traffic. If you download a page on website that consists of 12 gif-images and one html file, the file size and number of files transferred can be measured even when encrypted. The size and amount of files creates a fairly unique signature that may be used to deanonymize your surfing habits. The garlic routing concept I2P 3] tries to solve this by padding the length of the packets. It makes it very hard to infer anything from the measurements of the data streams.

To sum it up, if you intend to use an anonymization service, know who youre hiding from and remember that you cant trust the service. Dont ever send credentials in clear text over an anonymizer, if you cant handle someone reading them. Adding end-to-end encryption will make exploitation of this by rogue nodes harder.

I dont care for TOR or any I2P networks, as I believe nosy neighbors or idiots running Aircrack being a more likely threat than the Swedish government. I settle for a fairly useless service called dold.se, well knowing its only as good as IDGs reputation. Remember it terminates in Sweden, so FRA will be able to read the traffic anyway. And if the raid of Bahnhof in 2005 is any indicator, its not that much protection at all. 4)


(Originally written 2010-01-18)

Tags: Privacy, network security
Posted: 2010-06-17 by Erik Zalitis
Changed: 2010-06-17 by Erik Zalitis

News archive