Quote: (02-22-2016 06:19 PM)The Beast1 Wrote:
Do you follow any IT security blogs or news wires? If so, you'd be aware about this https://en.wikipedia.org/wiki/Bullrun_(d...n_program)
They've already cracked SSL and TLS. This isn't a few zero day exploits. This is far worse.
Agreed, that is some scary stuff.
If they can easily crack SSL/TLS then your end point IP address is up for grabs. And if they can crack into the VPN of a foreign governments nuclear program they can definitely crack into your VPN provider and identify you that way.
However there are two things you're forgetting:
1) Motivation
Are the NSA motivated to attack this website? My belief is no. My strategy is based on
dragnet global surveillance not a targeted attack on RVF by the NSA. To stand a chance against that you need far more thorough security than what I've mentioned here.
2) Tor
If you've previously connected to a website via Tor, retroactively finding that user is very difficult because thousands of users use the same exit node.
Quote: (02-22-2016 06:19 PM)The Beast1 Wrote:
Quote: (02-22-2016 04:42 PM)Valentine Wrote:
Quote: (02-22-2016 01:38 PM)The Beast1 Wrote:
They still monitor the back bone provider that RVF's server is connected to. They'll see your data coming from multiple places and go, "Ah Valentine is using TOR again" and attach your information from the TOR link to your previous accessed information.
Care to provide a source for this?
Here's one example: https://en.wikipedia.org/wiki/Room_641A
If they've cracked into the backbone like that, they're most likely doing far more nefarious stuff that we can only fathom. In the US there are 9 back bone network providers. It isn't farfetched to believe they have their fingers in each one.
Oh right. That isn't too dissimilar from TEMPORA
https://en.m.wikipedia.org/wiki/Tempora as they're essentially copying the whole internet.
In my opinion this is all the more reason to only enter information on sites which use HTTPS or Tor hidden services so all they receive is encrypted web traffic.
Whether they'll put a higher priority on cracking encrypted traffic rather than analysing HTTP traffic we'll never know. It is possible that you make yourself more interesting to authorities by doing this.
However Snowden himself stated that encryption works. It's an extra barrier in their way. In fact it's the only barrier in their way.
If this stops even 10% of our web traffic from being analysed then this may lower flagged profiles labels from 'dissident' to 'hobbyist'.
The other big question mark is
traffic analysis.
If traffic analysis can identify you despite using a VPN, then attacking the website isn't even necessary.
I don't know to the extent their traffic analysis is able to deanonymise you. But if it's the case where the metadata transparently reveals your identity then perhaps RVF should be accessed via Tor only. Adding a Tor hidden service as well would further boost privacy.
After all in Snowden's released documents they said themselves that they can only deanonymise a small percentage of Tor users for a small amount of time. Plus looking at case studies of criminals who successfully stayed anonymous online, all used Tor to do so. VPN users were caught immediately.
Quote: (02-22-2016 01:38 PM)The Beast1 Wrote:
Using a VPN on foreign soil isn't much of an advantage either. Your data is not any more safer in Sweden than it is in the US. In fact, all it takes is a little coercion by the US on its vassal states and they'll do whatever the US wants. Sweden tried to press bunk rape changes on Assange, sharing VPN data for a non citizen would be even easier to pull off.
Yeah VPNs can be easily nullified via Bullrun or political pressure. Ideally though you're not that big of a target and would use Tor at that point.
Quote: (02-22-2016 01:38 PM)The Beast1 Wrote:
Quote: (02-22-2016 04:42 PM)Valentine Wrote:
The Beast1, your main issue seems to be with VPNs and Tor.
My problem really mostly stems with from overkill security paranoia prepping without identifying the pros and cons of each set up. Don't get me wrong, they are useful tools and serve a purpose. However saying, "you'll be safe if you do this!" is disingenuous. VPNs and Tor for visiting this site and others are over kill and aren't perfectly safe.
If you want to be 100% safe, stepping away from this forum and red pill stuff for good and not participating is the only way.
Agreed, that's the only way to be guaranteed secure. Hopefully everyone is able to make a decision that they're comfortable with from our discussion.
Definitely not saying you're 100% safe with my recommendations. But I still believe that encrypted traffic is better than unencrypted. Especially if you're using Tor's anonymising layer.
Quote: (02-22-2016 01:38 PM)The Beast1 Wrote:
All of what we say here has been logged for others to see. If they're splicing into fiber optic cables at the backbone level, it's obvious they are able to do far more with that data than we can even realize.
The key problem is, the NSA and other security agencies have destroyed internet security. There isn't any safe means of communicating or visiting sites on the internet anymore. You can obscure and spread your data around making it difficult for someone to find you, but at that point you're inviting further investigation when your ISP notices hidden traffic coming out of your network left and right.
Quote: (02-22-2016 04:42 PM)Valentine Wrote:
I really don't see the benefit of connecting transparently. Do you do so?
I do as a matter of fact. At this juncture, there really isn't any benefit to connecting opaquely either. They've already identified all of us just by metadata alone. I'm hopeful one day these records could be opened by us. I'd be curious to see if they know what my porn fetishes are ![[Image: tard.gif]](https://rooshvforum.network/images/smilies/new/tard.gif)
If they're able to collect and decrypt all encrypted web traffic then that's true. However with the volume of encrypted traffic they receive we don't know if that's true, and could be doubly moreso for Tor encrypted traffic.
On the traffic analysis and metadata side I've found little solid information regarding their ability to positively identify you if you're using a VPN so if you have some please do share. Likewise with Tor.
Regarding your ISP seeing hidden traffic, I agree that is a potential threat. They could keep a closer eye on your non-hidden traffic thereafter. This could lead to them discovering your crimethink in a slip up. But is telling them exactly what you do online by connecting transparently really any better? You've just given yourself away immediately and you have 0% chance of anonymity. On the other hand if you encrypt traffic, then you've given yourself at least a 1% chance.
By the way I just want to thank you The Beast1 for your intelligent and well argued replies. You've raised some fine arguments and though I disagree with you you've given myself and I'm sure many other readers a lot to think about.
The issue of digital privacy is one with few definite answers. We're operating on assumptions on both sides of this discussion because we don't know the full capabilities of our enemies. For that reason we'll never be able to come to a consensus on the best strategy to take, but I hope others are able to take something from this to make a more informed decision.