Author Topic: Common Fallacy  (Read 1295 times)

0 Members and 1 Guest are viewing this topic.

Offline Anonymous2389489123

  • NULL
  • Posts: 3
  • Cookies: -1
    • View Profile
Common Fallacy
« on: September 22, 2015, 02:50:55 am »
Remember guys,

Statistical analysis will reveal you if the first and last node you connect to are compromised/subpoenad. If you use six different proxy servers, the only thing a government or adversary needs access to to find out that you pwned a machine is the first proxy you connect to and the last proxy you connect to. Using statistics and packet analysis, they can figure out those two are connected without having to lead the chain down whatever proxies were in the middle.

Three servers between you and a client are pretty much as much as you want. The ones in between your first and last proxy server only serve to make it harder to tell that those two at the ends were used in the same connection. Anything beyond that really only serves to make your internet slower.

« Last Edit: September 22, 2015, 02:51:44 am by Anonymous2389489123 »

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Common Fallacy
« Reply #1 on: September 22, 2015, 07:32:45 am »
But how would they trace the last proxy you used? if they got to that, they wouldn't need to do packet analysis, it'd be obvious already. Unless it doesn't keep logs, but that's unlikely.

Offline Anonymous2389489123

  • NULL
  • Posts: 3
  • Cookies: -1
    • View Profile
Re: Common Fallacy
« Reply #2 on: September 23, 2015, 12:24:49 am »
If you are using multiple proxies then being compromised by the first one is not enough to link you to a connection. Just having the first one only shows you are connecting to proxy one and using that to connect to another.

It's the same reason why you only need two compromised nodes on a tor connection (the ends) in order to de-anonymize the user. Just having the first node won't be enough. It's also why there is a feature on tor to use more than three connections, but it's not recommended by the developers (no significant increase in security).
« Last Edit: September 23, 2015, 12:26:58 am by Anonymous2389489123 »