Building tracking system to nab Tor pedophiles
Paul Syverson
syverson at itd.nrl.navy.mil
Wed Mar 7 20:42:43 UTC 2007
On Wed, Mar 07, 2007 at 02:14:33PM -0600, Mike Perry wrote:
> Thus spake Freemor (freemor at yahoo.ca):
>
> > I think what needs to be done here is to create a FAQ or other standard
> > document that will 1.) inform the vastly misinformed public. 2.) list
> > places and ways they can make a difference.
>
> Excellent post, even if slight off-topic.
I don't think it was off topic. To repeat what I already said in
an individual response.
I think it was not OT since your post addressed the reality of a
situation for which people were designing Tor modifications and
deployments and you evaluated their applicability to intended
application.
> As suggested on IRC, I think
> the Tor documentation strategy needs to be rethought. Most people
> barely read the download page, let alone the reems of FAQ questions.
>
> We've had two "attacks" now on Tor that rely on unmasking users who
> use Tor incorrectly. One of them actually published a paper and had
> decent results at unmasking this way (mostly Asian users who probably
> can't read our english mailinglist or english FAQ), and the media
> still doesn't seem to understand that these attacks are well
> documented.
>
> The Tor download page should have a concice "Things to know before
> downloading" section that lists a few key points about the most easy
> ways your identity can be revealed through Tor. Something like
>
> Things to know before you download Tor:
> - Browser plugins can be made to reveal your IP.
> - This includes Flash, Java, ActiveX and others.
> - It is recommended that you use FireFox and install the extensions
> NoScript, QuickJava, and FlashBlock to control this behavior if
> you must have these plugins installed for non-Tor usage.
> - Make sure your browser settings have a proxy listed for ALL
> protocols (including Gopher and FTP).
> - For further details, please consult the Tor FAQ.
>
I had advocated something similar some time ago. Actually what I proposed
was that some sort of test server be set up. I know there are already
many of them, but I was thinking that there could be testing stages
in an install wizard (or a post-install testing wizard)
that takes the user through various tests and what to do in response
to results. I know a lot of work, maybe another suggestion to be
listed on the volunteer page or a candidate for summer of code?
> Maybe this will stop the same attack from hitting the blogosphere
> every 2 months. Even better, maybe it will stop that attack from
> actually working..
>
You dream big (not sure which is the bigger dream ;>)
aloha,
Paul
More information about the tor-talk
mailing list