NSA tracks Google ads to find Tor users(cnet.com) |
NSA tracks Google ads to find Tor users(cnet.com) |
Suppose Alfred hosts a Tor onion describing relativistic physics.
Suppose Bob cautiously uses Tor to consult such information on a regular basis.
Then depending on priviliged access or leverage on the internet backbone multiple approaches can be used:
A) suppose some regions randomly suffer internet or power black-outs. Obviously a Tor onion interacting with the Tor network is not in that region. While a Tor onion disconnected for the duration of such an event is possibly/probably in one of such regions. Similar for tor Browsers.
B) instead of waiting for spontaneous events they can be elicited (costly in case of internet blackouts, very costly in case of energy blackouts).
C) instead of disabling participation, one can randomly stall it: if ISP's at both ends co-operate or are compromised, network packets can be intentionally given known pseudorandom delays on top of the spontaneous delays. By calculating the correlation of the delays one can identify which Tor user IP address is frequenting which Tor onion host IP address. This works even if the added delays are smaller than the spontaneous delays, because the spontaneous delays are uncorrelated with the injected delays so the "correlation" of the spontaneous delays with the injected delays will average towards 0, whereas the correlation factor of injected delays will correlate with the injected delays. The number of packets necessary to have true positives raise above the noise floor depends on the relative sizes of the spontaneous variation in delays and the injected delays. If the injection delays are smaller it will take many more packets before true positives rise above the noise floor.
This article is from the time of the Snowden leaks, more than 10 years ago.
The moment they have correlated the traffic on your ISP's end, with the traffic on the specific Tor onion's ISP's end, they can just ask your ISP for your true name.
In this case the experts were convinced cookies were used, which is conceivably correct for a fraction of the users. The cookies and ads were probably multifunctionally abused: tracking random browsing, spam email for lucky hits, propagation delay injection of the advertisement packets, ...
I assume the reader knows the basics of asymmetric cryptography, for sake of brevity and simplicity lets us consider RSA, even though thats not the onion encryption in Tor uses. I assume the reader is familiar with the mathematics behind RSA, and the basic proofs that decrypting the encrypted number results in the original number, so familiarity with modular arithmetic, modular exponentiation etc is assumed...
I assume the reader knows the basic concept of onion routing: the sender of a packet chooses an arbitrary path through routing nodes, whose public keys are known, and first encrypts the packet for the exit node's public key, then encrypts that for the next-to-last nodes public key, and so on in a backwards fashion to finally encrypt the onion packet for the first routing node's public key. At each layer a bit of metadata is encrypted along so the routing nodes know only the next node to send their decryption to. So the N-layer encrypted packet is sent to the first routing node, which decrypts the first layer, splits the metadata from the N-1-times encrypted packet, and sends the latter to the next node mentioned in the metadata.
From the perspective of an ISP or 3 letter agency monitoring the traffic of a specific intermediate routing node, they see encrypted packets arrive, and encrypted packets leaving.
Let me first state the obvious, but which I will NOT rely on:
If the eavesdropper were to possess the capability to break RSA, they could trivially decrypt the packet and associate the incoming packets to the outgoing packets. (let us ignore that if they could break RSA, they could just decrypt the whole layered onion of the packet at once...).
To transliterate to math:
EavesDropperAbleToBreakRSA => EavesDropperAbleToTrackPackets
given "A => B" and "not A" one is unable to prove "not B", although it is tempting to jump to that conclusion. B can be true while A is false, it would just mean that the eavesdropper could track packets in an alternative manner, but how?
Lets go back to our hypothetical naive RSA implementation of Tor:
Is it really necessary to break RSA to match incoming and outgoing packets of an intermediate node?
Of course not: imagine first for simplicity that the node only received 2 incoming packets, and 2 outgoing packets.
This means the eavesdropper sees 2 incoming k+1 times encrypted packets, and 2 k-times encrypted packets, which happen to be the decryption of the incomming packets. Why break RSA if the outgoing packets ARE the decryptions? One merely needs to re-encrypt the outgoing packets with the proper metadata, given the routing node's public key, and one should end up with identically one of the 2 incoming packets, so consolidating ISP powers, or other attackers able to monitor network traffic on a sufficient number of nodes can simply track packets in the onion network. Effectively the k+1-times encrypted packet is an RSA signature of the k-times encrypted packet!!!
Suppose a random route is 5 hops long and that there are 30 routing nodes (not realistic but insightful as we will see).
Suppose only the entry node packet and the exit node packet are logged, but not the intermediate traffic. How computationally expensive would it be to guess and verify the route?
that would be 30 times 29 times 28 times 27 times 26 combinations. Each combination would consist of 5 encryptions/signature checks. Very feasible to brute force.
The reason this is insightful is that a dominant eavesdropped missing observability on a small number of links can brute force these without having to break RSA, and still verifiably confirm the actual route. It would only need to consider public keys of nodes on which observability it lacks. So this becomes expensive much quicker for entities that have less eavesdropping infrastructure, than for dominant eavesdroppers.
A security researcher who understands this potential ploy in onion routing networks will have a hard time proving the exploit in practice, because the researcher lacks the eavesdropping powers that ISP's and 3 letter agencies possess.
they target politicians, whistleblowers and journalists.
if you ever volunteered to organizations helping those you quickly Learn that group is not very tech literate, have cheap limited devices, skips instructions.
https://en.m.wikipedia.org/wiki/Tor_(network)#EgotisticalGir...
You don’t have to login to be given a cookie that’s then stored and tracked across each new IP that Tor cycles through.
Google has programs where they can identify budding extremists and correlate behavior to medical diagnoses without HIPAA exposure.
If your secret weird shit that you’re doing with Tor is of interest, they’ll eventually get a profile. Using Tor is like setting off the bat signal.
The fact that we tolerate this shit is unbelievable.
In other words, just using tails will solve this issue because every session gives you a clean environment.
“The NSA buys ads from ad display companies like Google and seeds them around Tor's access points.”
"On the off chance that [the spam recipient] renders the HTML or clicks a link, [the NSA] can connect your e-mail address to your browser," he explained, which the NSA would have already connected to an IP address. "Using Tor or any proxy wouldn't prevent it."
Everytime I log into a site that I want to buy something from, I always clear cache, cookies, logins before and after using that site.
Yes it can be a PITA, but I think that stops other sites from looking to see what WEB sites you really care about.
about:preferences -> Privacy & Security -> Cookies and Site Data -> [x] Delete cookies and site data when Firefox is closed -> Manage Exceptions
Just don't forget to back up your `~/.mozilla/firefox/*.default-release/cookies.sqlite*` beforehand.
I'm honestly just waiting for people to realise that online ads are the root cause of most of the things people complain about.
Fake news? Check
Surveillance state? Check
Screen addiction? Check
Lack of nuance in any debate? Check
Unsavoury geopolitical influence? Check
The advertising industry somehow manage to stay relevant, despite the fact that their business is literally the same as the dictionary definition of brain washing.
Ah well, old man yells at clouds...
Ads can, in theory, serve a useful purpose, informing individuals of products and services which would legitimately make their lives better (e.g., I bought a low-end immersion blender a year or two ago, didn't know they existed too far beforehand, and am quite happy with the ease/safety improvements over any other blending strategy I used to have, especially for bulk and/or hot liquids, especially compared to what I paid and how much space it takes, but without _some_ kind of ad I might never have known about the product (not a perfect example, since I learned about them from a friend, but hypothetically)).
The push-based ad ecosystem has a tacit assumption that people don't want the products and services being sold. That's a mostly true assumption, but instead of the solution being filtering to better products, well-vetted products, avoiding added-cost-without-added-benefit lookalike products, not advertising outright frauds, ..., the industry has opted for more invasive ways of forcing us to watch things we won't ever care about and siphoning invasive tax/healthcare/... information to slightly reduce the miss-rate in ad serving.
That's probably inevitable without regulation (it's cheaper to bully people into watching ads than to improve your ad inventory, with the side benefit that as an ad network you profit when suckers fall for the frauds too, plus it's easier to charge the company making money instead of the end consumer, so a profit-focused company will naturally swim that direction). As an alternative business model though, imagine great search tools on top of a pool of better ad inventory, where you could choose the demographic info and interests you wanted to be considered for a particular search session instead of having that inferred from your browsing history and the raw copies of your paystubs your employer is likely selling.
I'm not saying the industry can't be useful, I'm saying that it's broken.
If it ends the "brainwashing" it would be because people would not be on the Internet at all. And maybe that's a net good for the world. But here are you and me, on a web site that is itself basically an advertisement for a VC firm.
Artists must get paid, or they will either starve or stop making art.
This is the fundamental threat we have structured our entire civilization around. Art must be labor. Labor must have monetary value. Without income, people must starve and die.
To support this system, we have the most untenable law of the digital age: copyright. The most trivial act, to copy data, shall be monopolized.
But copyright didn't stop there. It grew. We use it to censor. We use it to moderate. We use it to end fraud. We use it to prevent libel. We use it to guarantee collaboration of work. Copyright has become the swiss army knife of law.
When a dull knife slips, it cuts deep.
We're well beyond the arguments for the recommendation graphs and the open market. Adtech, as it's currently practiced, is basically rage farming in disguise.
Gotta maximise that emotional quotient.
And also Whonix: https://en.wikipedia.org/wiki/Whonix
Using the DVD image in a VM would largely suffice for most users. For even more security, you would use the live image on a throwaway laptop at a coffee shop or something, but that's not exactly practical for everyday use.
They did similar work with ad campaigns to defuse individuals who were in danger of becoming extremists, etc.
The fact that we tolerate it is relatively expected; the fact that Snowden leaked 90% of this stuff a decade ago and nobody cares is what's unbelievable. We kinda deserve to be surveilled if this kind of apathy is what dominates our behavior and executive function.
Approximately zero Americans think this affects them, and the usual tropes "If you have nothing to hide, why do you use curtains?" result in "That's different, duh."
A few are split whether they care Ring video is available to law enforcement, most think it's a benefit.
Interestingly, all care quite a lot whether an AirBnB host has cameras inside the property. Privacy suddenly matters.
At the same time, most shrug if you assert the government has all their emails and social messaging, in a "What are you gonna do?" and "If they want to read all that more power to 'em…" way.
For people to care about most anything abstract, they must believe it affects them personally, and be able to both picture and believe a credible bad outcome.
While the AirBnB creep works, it seems everything else is filed under "That's about someone else, not me."
Why? If people prefer these options, I don't see how forcing them into an alternative is any better. People on X could enjoy a free experience with no ads if they used Mastodon instead, but they actively seek out X. They want an ads-included package because they feel that the value is stronger than the alternatives.
I despise ads, but I don't think it's fair to characterize ads as market abuse any more than paid services are abusive. People consider the deal fair, they don't care about surveillance capitalism and they want to watch their YouTube video.
Wouldnt an "AI-Container-as-A-Browser" be nifty:
Create a container that runs with an AI agent that does your browsing "for you" whereby it does the connection, cookie management, anonymously tor' wrapping as required/set/needed such that you have an abstraction between you and all your browsing, and the browser can dev/null the ads and never let them render and poison the reply with synthetic data crafting all packets that go back to the cookie providers?
I also want ti to auto crawl an delete PII from all ad / identity brokers / white-pages/scam-spam. a "Delete me from the internet" bot
I really really want this.
Regarding deletion, did you know about this service? https://joindeleteme.com/
I know their services are valuable, im not against them - I am saying that in the age of GPT-code-slave-bots I'd rather learn the process of figuring out how to tell the AI what I want and I also iteratively learn through the process.
Its wonderful being able to explore ideas so fluidly with the GPTs even though we know/discover their limitations, mal-intent, and other filters/guardrails/alignments and allegiances
Why?
It's your choice, but everyone knows AI is like poison for deterministic problem-solving. Learning how to better rely on an unreliable machine only guarantees that you're feeble when you have to do something without it. Like relying on autopilot when you don't know how to fly a plane, or trying to get HAL-9000 to open the airlock when you weren't trained on the manual process.
Using AI to automate takedown requests is just pointless. The only reason automated takedowns work is that their automated messages are canned and written by lawyers with a user as the signatory. If you have AI agents write custom and non-binding requests to people that hold your data, nobody will care. At that point you may as well copy-and-paste the messages yourself and save the hassle of correcting a brainless subordinate.
> Its wonderful being able to explore ideas so fluidly with the GPTs even though we know/discover their limitations, mal-intent, and other filters/guardrails/alignments and allegiances
It's as if the first-world has rediscovered the joy of reading, after a brief affair with smartphones, media paranoia and a couple election cycles dominated by misinformation bubbles. Finally, an unopinionated author with no lived-experience to frame their perspective! It's just what we've all been waiting for (besides the bias).
What I said what I like to tell the bots to give me a python snippet to do a chore, and explain to me how they are doing it and teach me along the way, and document the functions so i can learn, and read them and know what they do,
For example, and HNer posted their VanillaJSX Show HN: today - and it had some interesting UI demos -- so I am right now building a Flask app that uses VanillaJSX elements for a player.js tied to yt-dlp to have a locally hosted Youtube front page player that will download the youtube video locally, display my downloads on a page with a player and the VanillaJSX player elements, just so I can see if I can.
Again, it's your choice how to spend your time. I just cannot fathom the idea of learning from an LLM, a tool designed to expand on wrong answers and ignore the discrimination between fantasy and reality. It feels to me like this stems from a distrust in human-written literature, or at least a struggle to access it. Maybe this is what it feels like getting old.
When I pickup a hammer, I dont expect it to build the actual house. But when I Intent and WIllfully use it on its designated task, its the same as weilding a GPT/AI - you have to be really specific.
I admit I totally agree with having to debug the code that it generates. But since I know how to goad it into my intent for learning a thing.
Also - I wrote up extensively about using a discernment lattice to attempt to corral the AIs "expertness" as much as possible to keep it on a subject.
I also force it to use, cite and describe sources I tell it to use when I am telling it to be an expert.
https://i.imgur.com/Fi5GYRl.png