Hello.

Mouse Fingerprinting, Keyboard Fingerprinting, Device Fingerprinting (Active 
collection modes, using hidden channel in the legit TCP/IP trafic going through 
TOR) are specialities that have NO SOLUTION with "software only » approaches.
These problems cannot be solved by software only. The can be fixed definitely 
through 100% Free Integrated Circuits based computers that solve these issue 
through hardware changes.

To me, any attempt to « solve » these issues by software can only be a fraud.

I’m open to debate.

Le 17 mars 2016 à 18:31, ban...@openmailbox.org a écrit :

> == Attack Description ==
> 
> Keystroke fingerprinting works by measuring how long keys are pressed and the 
> time between presses. Its very high accuracy poses a serious threat to 
> anonymous users.[1]
> 
> This tracking technology has been deployed by major advertisers (Google, 
> Facebook), banks and massive online courses. Its also happening at a massive 
> scale because just using a JS application (or SSH in interactive mode) in 
> presence of a network adversary that records all traffic allows them to 
> construct biometric models for virtually everyone (think Google suggestions) 
> even if the website does not record these biometric stats itself.[2] They 
> have this data from everyone's clearnet browsing and by comparing this to 
> data exiting the Tor network they will unmask users.
> 
> == Current Measures and Threat Model ==
> 
> While the Tor Browser team is aware of the problem and working on a solution, 
> current measures [6] are not enough. [4][5]
> 
> Security distros are designed to protect the user even if an end user 
> application is compromised and provide desfense in depth.
> 
> The goal is to protect users even in the event of an attacker taking over an 
> application running ina VM/Container.
> 
> This is valid for systems running in VMs or on bare metal.
> 
> 
> == Existing Work on Countermeasures ==
> 
> As a countermeasure security researcher Paul Moore created a prototype Chrome 
> plugin known as KeyboardPrivacy. It works by caching keystrokes and 
> introducing a random delay before passing them on to a webpage.[3] 
> Unfortunately there is no source code available for the add-on and the 
> planned Firefox version has not surfaced so far. There are hints that the 
> author wants to create a closed hardware soltuion that implements this which 
> does not help our cause.
> 
> 
> == Proposal for a System-wide Solution ==
> 
> A very much needed project would be to write a program that mimics the 
> functionality of the this add-on but on the display server / OS level. 
> Ideally the solution would be compatible with Wayland for the upcoming 
> transition in the near future.
> 
> 
> 
> 
> [1] 
> http://arstechnica.com/security/2015/07/how-the-way-you-type-can-shatter-anonymity-even-on-tor/
> 
> [2] http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7358795
> 
> [3] https://archive.is/vCvWb
> 
> [4] 
> https://www.lightbluetouchpaper.org/2015/07/30/double-bill-password-hashing-competition-keyboardprivacy/#comment-1288166
> 
> [5] https://trac.torproject.org/projects/tor/ticket/16110
> 
> [6] https://trac.torproject.org/projects/tor/ticket/1517
> 
> 
> 
> ***
> 
> This feature request has been mirrored on each project's bugtrackers 
> respectively:
> 
> https://github.com/subgraph/subgraph-os-issues/issues/103
> https://labs.riseup.net/code/issues/11257
> https://github.com/QubesOS/qubes-issues/issues/1850
> 
> _______________________________________________
> Desktops mailing list
> deskt...@secure-os.org
> https://secure-os.org/cgi-bin/mailman/listinfo/desktops

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Reply via email to