On Fri, Jul 08, 2016 at 08:17:05AM -0400, Sci Fith wrote:
> 
> I've tested for research purposes running both proxychains and
> openvpn setups using 2-3 VPSs with private ip addresses from bolt vm
> for really cheap per month. Worked really well as an alternative to
> using Tor.
> 
> Question, If you run your own relays couldn't you just force your
> host to connect to your relays only, thus ensuring that you won't
> randomly hit a malicious exit or be de-anon by nefarious actor? Yes
> this assumes you have a guard and exit relay running as well, but
> still wondering the security of that versus other setups.


Assuming that your client-guard connection is not observed _and_ your
adversary cannot learn through observation that those relays are
yours, then you would (mostly) avoid de-anon. The problem is that this
association is not easily hidden. If, e.g., your exit's ISP notices
repeated patterns from certain circuits, it can form a pseudonymous
profile of you. Now if there is ever a single link to your actual IP
or other sensitive identifier that whole profile is linked to
you---probably worse than a single connection de-anon.

This is a major basis for Tor in the first place. When we created
onion routing, we noted that a Navy only network would identify
traffic into/out of the network as for the Navy. So one had to carry
traffic for diverse parties to protect against this. And since
limiting traffic to those trusting an entirely Navy run network is
similarly problematic, you have to let diverse others run some of the
network. And since they won't just trust your code, it has to be open
source. That is how we have been doing it since the nineties.

One could, as you suggest, just use your own trusted relays within
that larger network. But that brings you a long way back towards the
original problem we were looking at in 1995. Leveraging trust safely
and efficiently turns out to be hard. We've been looking at this for a
while now. For our latest publication on incorporating trust in
relays, ISPs, etc. into routing decisions see "20,000 In League
Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea
Cables" Jaggard et al. Proceedings on Privacy Enhancing Technologies 1(1).
https://www.nrl.navy.mil/itd/chacs/jaggard-20000-league-under-sea-anonymous-communication-trust-mlats-and-undersea-cables-proceedings

HTH,
Paul
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to