Re: Anonymize internet access

From: Jeffrey F. Bloss (
Date: 09/28/05

  • Next message: Michael Painter: "Re: Anonymize internet access"
    To: Michael Painter <>
    Date: Wed, 28 Sep 2005 03:47:18 -0400

    Hash: SHA1

    On Wednesday 28 September 2005 02:42 am, Michael Painter wrote:

    > I was unable to find that thread and I'd really like to read it. What do I
    > do with: Message-ID: <> (?)

    > Some years back, I tested a beta program from Zero Knowledge Freedom which
    > (I think) chained together their servers such that it was supposedly
    > impossible to trace from the endpoint, even with logs. For whatever
    > reasons, they folded up but I've always wondered if it was it was really
    > true or if a hole was discovered.

    It's true. The philosophy is that you transfer data inside nested "packages".
    The outer package is encrypted to the first node in the chain. Inside that
    package, the first node finds another package that's encrypted to the second
    node in the chain, and that nodes address. It strips off its own layer of
    encryption and sends the package on to node two. Node two opens its package
    to find another one, encrypted to node three (and node three's address). The
    minimum is three.

    If you visualize this, you might begin to see that the first node can only
    know two things... where the original package came from, and the address of
    the second node. But not the ultimate contents of the packages.

    The second node can only know that an encrypted package came from the first
    node, and another one was sent to the third node. But not the origin,
    ultimate destination, or the package contents.

    The third node can only see an encrypted package coming from the second, the
    final destination., and of course the package contents, but not the origin.

    That's mix and onion routing protocols in a nutshell. :)

    > I'm all ears...can you point me to how/where to get started?

    My suggestion would be to start here...

    Read. Read again. Read a third time. ;)

    Download tor and Privoxy, set them up per the instructions you've read three
    times now (it's really not all that tough), and once you think you have all
    the software configured properly, point your browser here...

    If an IP address other than your own shows up, you should be in business.
    Browser wise anyway. You should still visit this site though...

    It should point out any leaks you might have in your setup. If you pass all
    these tests, you're definitely in business for anonymous surfing.

    There's other options out there too, like JAP, but the fact that tor is a
    SOCKS proxy makes it useful for a lot of other things. Most IRC and IM
    clients for instance, can be configured to use tor natively an give you
    anonymous chat and messaging. Most file sharing software can be anonymized
    too, as well as the Azerus (sic) bit torrent client.

    When you get comfortable with tor and its SOCKS proxy interface, you might
    want to get all serious about it and try tunneling an SSL encrypted session
    through tor, and bounce it off an SSH port forwarding account... and be so
    anonymous even YOU won't know who you are. <grin>

    That's a bit of an exaggeration of course, but in my and a lot of other
    people's opinions, this is the best privacy/anonymity available today, and
    the price is definitely right.
    Version: GnuPG v1.4.2 (GNU/Linux)

    -----END PGP SIGNATURE-----

  • Next message: Michael Painter: "Re: Anonymize internet access"

    Relevant Pages

    • Re: Workable encryption in Tcl??
      ... >>have not tried the package on the platform you intend to use it on. ... It was my understanding that Tcl wasn't ... I'm sure that TclDES will be slower than just about any C/Assembly ... dealing with block-mode encryption ...
    • Re: Anonymize internet access
      ... Subject: Anonymize internet access ... through tor, and bounce it off an SSH port forwarding account... ... > The outer package is encrypted to the first node in the chain. ... > encryption and sends the package on to node two. ...
    • Re: Hard Disk Encryption
      ... I was thinking about getting one of those hard drive encryption software packages that prevent access to my computer all the way from the boot-up/bios stage. ... Does it affect anything or will it slow my laptop down too much to run Delphi? ... only issue i have observed is that when Windows boots and i first start Delphi, Delphi whinges about "package xxx cannot be found" - which is a nice reminder to mount the encrypted partition. ...
    • Re: MSI Errors with Encryption On
      ... Turn of encryption on your TEMP folder when you install such package. ... If the installer does not use TEMP, ...
    • Re: Installing Tor in Linux
      ... I've been trying to install Tor in a test computer running SUSE LINUX ... Unfortunately I keep running into all sorts of dependency ... Was the tor package compiled specifically for Suse 10? ...