Privacy Badger blocks this site

@saper

I went into firefox's delete cookies gui, and it showed 2 cookies from cdn-business.discourse.org, both expiring at the end of session:

_forum_session some_long_uuid
destination_url https%3A%2F%2Fcdn-origin-business.discourse.org%2F

I reloaded my browser, cookies gone, I come back here, unblocked the site, and I see in firefox f12

cookie is being sent on requests to: cdn-business.discourse.org, and avatars.discourse.org:
__cfduid:"ddb2579dfb5ea89125b285f..."
In firefox preferences, it says this cookie belongs to discourse.org. This time, no cookie exists for cdn-business.discourse.org.

When I set privacy badger back to blocking cookies for the cdn domain, no cookie is sent on requests there.

Sorry, but now you made me curious. Put it into a gist if it is too much to post in this forum... :wink:

1 Like

@rugk
Difficult to explain briefly, which is perhaps why so many donā€™t understand, but security and trust are tricky. Not that itā€™s particularly complex - just that it requires making weighted decisions (never trust blindly), thought, and an attention span greater than Twitter. For a good introduction to trust and security read Bruce Schneierā€™s Liars and Outliers.

No system is completely secure and the weakest point in any secure system is invariably the meat bag that uses it. Most Tor users are clueless about OpSec - most donā€™t follow the Tor guidelines, and very few use Qubes OS (and even then, improperly). Very, very few untrained people use it from deniable locations and single use machines (a VM provides limited protection from firmware ā€œbugsā€ on the bare-metal).

Tor has many insecurities (a major one being) - but the greatest one is that people use it more than once from the same machine and same location - which is not what it was originally designed for (tacking more functions onto it doesnā€™t extend the security model - just the insecurities).

So why do so many defend itā€™s security without providing technical reasons (including the non-Navy developers)? See my original reference to Bruceā€™s explanation of trust and security - also consider that convenience is the enemy of security. That few arrests have included evidence gathered by compromising Tor sessions should provide as much comfort as traffic stops leading to arrests being labelled as ā€œrandomā€ (see parallel construction).

Iā€™m not going to give instructions on proper OpSec (which includes boring stuff like Risk Management). Like encryption the only way to determine the expertise of the source is to check their track record of defeating it - but most will simply follow the greatest number of lemmings (Tor is "hiding in a crowd"1) instead of hiring an expert, ensuring they know enough to determine if the expert it right, and then following the expert advice. Because that would be inconvenientā€¦


tl;dr Proper use of Tor is ā€œreasonablyā€ secure. For now. 1Unless internet traffic is recorded, and ISPs forced to retain billing records for government then future problems are of no concern. Iā€™d strongly suggest if people are truly concerned about hiding their browsing from all - forever, that they take it very seriously, and consider that just downloading some software, no matter how good, is not the solution.

1 Like

I think Tor tries to make this easier very much. E.g. take the recent introduction of the "Security slider".
Still the issue itself is of course about users and not about Tor.

You say this as if it would be a requirement to use Tor. I also doubt that most Freenet users use Quebes OS.
All in all is Quebes OS also really not related to Tor (except taht it has the ability to use Tor). So maybe we can say: "Few use Tails or Whonix"

What the hell what security requirements do you have? Why not use it from an air-gapped-machine. :wink:
Are you going to be the next Whisleblower or what?
You should consider that Tor users may have different threat models, different security requirements. They are different people, have different attackers, may ordinary users or experts, may militaries or whisleblowers and so on...
And you should adjust your behaviour (or OpSec) according to your threat model. That's the only useful thing you can do and should do. EFF has a very good guide about this.

You prove your claim by providing one source. So at first let me say you: Yes, of course every software has vulnerabilities and that's why such papers are great. When published (or sometimes better: before) these vulns can be fixed (if possible) or used for further improvement of the concept and so on. Also Tor is moving and constantly improving the security so you cannot blame them today and keep this opinion for the whole future.
And - needless to say - of course also Freenet has vuln. I don't see any basically - conceptional - difference here, which would be necessary to support the claim "Freenet is better than Tor" (because that's basically what you said).

As for the one paper you gave I read the Tor summary and it sounds like a kinda theoretical attack:

The first big question [...]: is their website fingerprinting classifier actually accurate in practice? They consider a world of 1000 front pages, but ahmia.fi and other onion-space crawlers have found millions of pages by looking beyond front pages. Their 2.9% false positive rate becomes enormous in the face of this many pagesā€”and the result is that the vast majority of the classification guesses will be mistakes.

For example, if the user loads ten pages, and the classifier outputs a guess for each web page she loads, will it output a stream of "She went to Facebook!" "She went to Riseup!" "She went to Wildleaks!" while actually she was just reading posts in a Bitcoin forum the whole time?

Additionally they highlight one thing about this:

First, for background, run (don't walk) to Mike Perry's blog post explaining why website fingerprinting papers have historically overestimated the risks for users:
A Critique of Website Traffic Fingerprinting Attacks | The Tor Project
and then check out Marc Juarez et al's followup paper from last year's ACM CCS that backs up many of Mike's concerns:
Free Haven's Selected Papers in Anonymity

(highlighting by me)

In any case I'd say this is not a "mayor" insecurity/vulnerability.

As said above, this depends on the thread model. You cannot generalize it the way you do.
Additional this is still no difference to FreeNet. How can you blame Tor for the things Tor users do wrong?
You also can't blame Freenet for the things Freenet users do wrong.

Can you provide a source for this claim?

Which functions?

Ah all right, veeery funny...

Wait...
So I just had a look at this article to see what you mean and okay: Yes, no door in your house in convenient and the door protects your security, but I would take care to transfer this model to security software.
Maybe security software should not be convenient, but the UX must is an important aspect of security software:

ā€œIf you write security software without taking the user experience into account, you end up harming your security. It is a vulnerability to not consider how the user will use your software,ā€ Brooks said.

As for Tor we have an example I already mentioned earlier: The security slider. It is easy/easier to understand, to configure, helps users to make the right choice and... yes, it is also somehow convenient. It makes the software understandable for users and that's what matters, because otherwise you have the users you describe, which are using the software wrong.
BTW: The security-slider is also a good example of users setting their own security level (based on their threat model). I think this thing, is really great. :wink:

Sorry, but this article is very long and covers also much other aspects. It would be good if you could quote the part you're referring to.

In case this "1" should refer to the ISP & internet traffic collection I don't see any connection to Tor here.
Additionally:

It is. Depending on the country you are it may be legal (retention laws) or may be done in secret (eh, there was someone called Snowden...) or maybe... not recorded(?).
At least there is one instance, which has one reason...

Besides of that: You know that the whole principle of Tor depends on many "lemmings" using it? You know that each Tor user is hiding in a crowd of "lemmings"?

Did you do that before using Freenet? Or before deciding to use Freenet?

I don't see this mentioned in your previous text, but interesting statement.
It just seems to contradict t to this statement:

So is Tor an option, or is not it? You leave us in confusion here.


tl;dr: You mostly only say that Tor users are doing it wrong. This may or may not be right, but it does certainly not explain why FreeNet is better than Tor. You also have not expressed any critique of any conceptional aspect of Tor.
Maybe you should try out the security slider of Tor... :laughing:

BTW I see this is going off-topic very much. As @SFITCS did not wanted to use a gist, I suggest to split this thread.

BTW: @SFITCS Some personalized forum-suggestions for you: Have you had a look into this topic?

@rugk

No - the issue is about both the user and the system. A weakness in either is a weakness. Security is binary - either it's secure, or it's not. Degrees are irrelevant if it can eventually be compromised. And yes, I'm very much aware of current record retention laws (I'm sorry you missed the sarcasm) - and cynical about them being meta-data only.

[quote="rugk, post:24, topic:17976, full:true"]
You say this as if it would be a requirement to use Tor. I also doubt that most Freenet users use Quebes OS.[/quote]
There is no "requirement" to using Tor. It would be a requirement for maintaining secrecy when persistently using Tor in the same requirement.

[quote="rugk, post:24, topic:17976, full:true"]what security requirements do you have? [/quote] That a secure process be secure. Not relatively or partially. Good OpSec negates targeted firmware exploits, Van Eck phreaking, or other emotionally over-invested goal-shifting arguments.

[quote="rugk, post:24, topic:17976, full:true"]
And you should adjust your behaviour (or OpSec) according to your threat model. [/quote] Which is just rehashing what I said about Risk Management.

[quote="rugk, post:24, topic:17976, full:true"]You prove your claim by providing one source.[/quote]A lack of evidence often only proves a lack of basic research. :disappointed:

[quote="rugk, post:24, topic:17976, full:true"]
And - needless to say - of course also Freenet has vuln.[/quote]
Yes. Apropos of what? No system is perfectly secure - whether it's secure enough for the intended purpose is another thing. In this discussion it's whether what you do can be ever attributed to you.

[quote="rugk, post:24, topic:17976, full:true"] I don't see any basically - conceptional - difference here[/quote]:astonished: The models are completely different. Don't confuse invite only with public.

[quote="rugk, post:24, topic:17976, full:true"]Their 2.9% false positive rate becomes[/quote]... a grave concern. If you're crossing the road and you know that someone is trying to run you down, but they have a 20% error rate - do you feel comfortable? It's not about whether someone can determine what you do upsets them by following all that you do. It's whether they can monitor particular sites and identify visitors... knowing they can within 97% should be a concern.

I have. I have you read Tao Wang response? Hopefully you didn't skim read Mike's post and miss it, or baulk at a wall of words larger than Bruce's short essay (which you asked me to cherry pick for you).
Some balance - Layering will reduce/remove the problem, and, Schneier on-board will, hopefully, remove some of the staffing problems.

[quote="rugk, post:24, topic:17976, full:true"]
You also can't blame software(sic) for the things software(sic users do wrong.
[/quote]Please don't falsely quote me.

[quote="rugk, post:24, topic:17976, full:true"]
Can you provide a source for this claim?
[/quote] Are you seriously suggesting that if I can't supply a Top Secret original design specification that the following is not true?
to cloak the online identity of government agents and informants while they are in the field
emphasis mine.
More information is available, or ask the source.

Forward security.

George Kadianakis, Damian Johnson, Andrea Shepard, David Chasteen, Moritz Bartl, Erinn Clark, Jacob Appelbaum, and many other "ex-"spooks/Tor developers. I don't see anything worth laughing about.

Context is important. See my earlier comment about the Twitter problem.

Again, context.

My original response was polite, considered, and brief. If you wish to continue this discussion seriously please post to Schneier's forum.

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.