On 04/26/2012 02:03 PM, Douglas Lucas wrote:
> Hi all,
> 
> On Thu, Apr 26, 2012 at 12:44 AM, Jacob Appelbaum <ja...@appelbaum.net>wrote:
> 
>> Practically, I also think that mixmaster is an example of "great on
>> paper" and soon we'll see how it works out in the real world. Now that
>> the FBI is taking nodes left (in New York last week) and right (in
>> Austria this week) - we'll note that some of these anonymity properties
>> are coming up for a serious test. For example, if you don't compose Tor
>> and Mixmaster together, what happens when you're the only person to ever
>> connect to Mixmaster? I think the answer is that you're a suspect,
>> cryptographic evidence be damned.
> 
> Note (the arrested and alleged Stratfor hacker) Jeremy Hammond's complaint
> (
> http://www.wired.com/images_blogs/threatlevel/2012/03/Hammond-Jeremy-Complaint.pdf)
> says an "FBI TOR network expert analyzed the data from the Pen/Trap
> and
> was able to determine that a significant portion of the traffic from
> [Hammond and others'] CHICAGO RESIDENCE to the Internet was TOR-related
> traffic." It goes on to say "[Hammond's] Apple MAC address was the only MAC
> address at the CHICAGO RESIDENCE that was connecting to known TOR network
> IP addresses. The defendant [...] has discussed with [the informant Sabu]
> that he used the TOR network" and elsewhere defines Tor as "a system
> designed to enable users to access the Internet anonymously [...]"
> 
> Because the FBI connected the only Tor use the Pen/Trap picked up with
> Hammond's specific MAC address, and because as Jacob pointed out elsewhere
> in this thread "members of police forces around the world use Tor, as does
> the Internet Watch Foundation," the Hammond complaint does not per se
> indicate that the FBI finds Tor use in itself suspicious. (Nor am I trying
> to knock Tor; I myself use it.) But -- the FBI has a Tor network expert? I
> wonder what the expert's job duties are, how many Tor experts they have,
> and what implications there might be of the FBI having a Tor expert(s).
> Anyone know? There is also the issue of ISPs throttling or potentially
> throttling Tor traffic, which is a form of suspicion.


That's a great question for a FOIA directed at the FBI - I think we'd
all like to know!

> 
> This is a tangent, but I wonder why Hammond didn't routinely spoof his MAC
> address. I guess it wouldn't have mattered, though.
> 

I think that is irrelevant - they probably would have resorted to RF
fingerprinting or something else, such as who was in the suspect's
house, if it wasn't made easier by this trivial example. I think it's an
example of how hard it is to anonymously do anything - Tor did a
perfectly fine job from the sound of it - the thing that mattered was
the human element. Lots of bad stuff to go around in the human element
in this case and many others.

All the best,
Jacob
_______________________________________________
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click "yes" (once you click above) 
next to "would you like to receive list mail batched in a daily digest?"

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

Reply via email to