[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Pixel Dust Is Futile
- To: coderman <[email protected]>
- Subject: Pixel Dust Is Futile
- From: [email protected] (John Young)
- Date: Thu, 05 Feb 2015 08:10:21 -0500
- Cc: [email protected]
- In-reply-to: <[email protected] mail.com>
- References: <CAD2Ti2-8bsR53P6-0DF==S7SvO19MY1WYSiex=N96QDN6pZriQ@mail.gmail.com> <CAJVRA1Q7s1HLMeH9zv8x88xnRMQ+VSSinptr0BjAUjqQyErJ+w@mail.gmail.com> <CAD2Ti2-+bU2g+XVdpNod41n2wgzKxF6rmxcvtTm-EWVX=fR6iw@mail.gmail.com> <CAJVRA1S8LUUEEXP+tBQeGAVb3zCBDd=MMQDz4gXm6T0q=KD4ow@mail.gmail.com> <CAD2Ti2-ZhpQJ+cEJdCS=JAqwE47Sbq3O5qqvNgHYG_S0zSyZRw@mail.gmail.com> <[email protected]> <CAJVRA1QUEu5rcQUUYXx14yU5By2gK=itahuUNh7yfy_dQ3XGtg@mail.gmail.com>
Peter Gutmann's pixel dust protection of privacy works as
an update for faith in elaborately futile shenanigans to evade
and to nab evaders inherently implanted in fetuses then re-implanted
in corpses: dust to dust.
Logs are as deceptive and who, what and how they log.
Machine designers and sysadmins artfully possessive
documentaries inherently evasive and capturing.
At 12:04 AM 2/5/2015, coderman wrote:
>On 2/4/15, John Young <[email protected]> wrote:
> > Darknet is hardly dark, or no more than Tor anonymizes,
> > ...
>
>true; perhaps best quantified as: "no ISP asshattery".
> but fails like all earth human technology in face of capable attacker
>with significant resources.
>
>[ specifically, onion overlay avoids TCP RST, DNS redir, local network
>ARP poisoning, IPv4/IPv6 BGP route jacking, transport privacy and
>authenticity** attacks (rewrite proxy) ]
>
>** key management, someone has to do it. and it is always cumbersome...
>
>but that is nary a sliver in the sky of surface exposed, in typical
>"rich web service" context, full of javascript and media handlers and
>plug-ins, oh my!
>
>
>tell us John, do your server logs show mostly complete or incomplete
>downloads of Cfour? :P