This commit is contained in:
nihilist 2024-08-14 18:59:20 +02:00
parent d96da68534
commit 85b33e216e
5 changed files with 15 additions and 13 deletions

BIN
servers/anonuse/1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 198 KiB

BIN
servers/anonuse/2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 326 KiB

BIN
servers/anonuse/3.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 161 KiB

View File

@ -53,7 +53,7 @@
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<a href="../anon.html">Previous Page</a></br></br><p><img src="../../assets/img/robert.png" width="50px" height="50px"> <ba>Robert - 06 / 08 / 24</ba></p>
<a href="../anon.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-08-14</ba></p>
<h1>Why isnt Privacy enough for Anonymous Use?</h1>
<p>In this post we are going to see why Privacy is not enough for Anonymous Use, and what can be done about it.</p>
@ -68,12 +68,16 @@
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Why isnt privacy with a VPN enough?</b></h2>
<p>Lets say that Bob is using an open-source browser and a VPN to access a website. Thinking he is safe, he provides a false name and address when creating an account.</p>
<p><b>It seems like Bob has some privacy, yet his anonymity can still be compromised.</b> The websites owner notices that Bob provided an inexistent address, which is a violation of the Terms of Service. The owner files a lawsuit, and <b>the court obliges Bobs VPN provider to deanonymize him.</b></p>
<img src="../torvsvpns/2.png" class="imgRz">
<p>This situation would have been avoided had Bob used Tor, which reroutes traffic in a way that obscures its origins and destinations, <b>making it nearly impossible to figure out who is connecting to what.</b></p>
<p>Bob is using an open-source browser and a VPN to access a website (in our example youtube), but then he starts thinking that it's enough to start to use that website anonymously, even though they don't allow it. <b>He starts to sign up and mentions a false name and address when creating an account. which infuriates the Youtube employee:</b></p>
<img src="3.png" class="imgRz">
<p>Bob's current setup is suitable for Private use as he is using <a href="../closedsource/index.html">open source software</a>, and a <a href="../vpn/index.html">VPN</a>, <b>But is it suitable for Anonymous use too ?</b></p>
<p>When you think about it, currently He is anonymous, as he hides his real IP from the destination website, and he didnt deanonymize himself through his actions while on the website. <b>The problem is how expensive is it to deanonymize Bob ?</b></p>
<p>To answer that, let's take the example of a Youtube employee being infuriated that Bob dared to lie about his personal information, and the employee decides to call some corrupt police agents (yes they have very close ties to the authorities) to do their bidding in order <b>to scare the VPN provider into revealing the real IP of whoever connected as Charlie Chaplin on youtube.com</b>, around the time where Bob signed up, in order to deanonymize Bob.</p>
<img src="2.png" class="imgRz">
<p>The end result is that the VPN provider has to give the data they have to the authorities, (<a href="https://www.pcmag.com/news/mullvad-vpn-hit-with-search-warrant-in-attempted-police-raid">which only works if they keep logs!</a>) and reveal Bob's Identity, and that only cost a few pennies to the adversary (here the youtube employee) to deanonymize Bob. </p>
<p><u>Conclusion:</u> Bob's setup is not suitable for Anonymous use, <b>because it is inexpensive for an adversary to deanonymize him.</b> </p>
<p>This situation would have been avoided had Bob used <a href="../anonymityexplained/index.html">Tor</a>, <b>which makes deanonymization attacks as expensive as possible.</b></p>
<img src="../torvsvpns/5.png" class="imgRz">
<p>With Tor, Bobs identity would be revealed only if he gave it up voluntarily.</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
@ -81,7 +85,7 @@
<!-- +++++ Footer Section +++++ -->
<div id="anonb">
<div id="anonb">
<div class="container">
<div class="row">
<div class="col-lg-4">
@ -96,14 +100,14 @@
<h4>My Links</h4>
<p>
<a target="_blank" rel="noopener noreferrer" href="http://blog.nihilism.network/rss/feed.xml">RSS Feed</a><br/><a target="_blank" rel="noopener noreferrer" href="https://matrix.to/#/#nihilism:m.datura.network">Matrix Chat</a><br/>
<a target="_blank" rel="noopener noreferrer" href="http://blog.nowhere.moe/rss/feed.xml">RSS Feed</a><br/><a target="_blank" rel="noopener noreferrer" href="https://matrix.to/#/#nihilism:m.nowhere.moe">Matrix Chat</a><br/>
</p>
</div><!-- /col-lg-4 -->
<div class="col-lg-4">
<h4>About Robert</h4>
<p style="word-wrap: break-word;"><u>Donate XMR:</u> 871Hun183Cc2yXRmP4cEeUG8uiCkXfZPFQt5WVK6tCgxedWTXrpFGNTi9aRgknjYsh3jCD6iY9eyxMpGdr4xNyDNT7ZrKsK</p></br><p><u>Website:</u> <a href="https://robertblinov.net">robertblinov.net</a></p></br><p><u>Contact:</u> <a href="https://simplex.chat/contact#/?v=1-4&smp=smp%3A%2F%2FPtsqghzQKU83kYTlQ1VKg996dW4Cw4x_bvpKmiv8uns%3D%40smp18.simplex.im%2Fs1Xf_PP6c0eqqsRiVtAWHmqoDOmP_2IT%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAQnaIgJ3YBozefStaPP1h1_5xjQAOfdVx9N8D-Gy7qmQ%253D%26srv%3Dlyqpnwbs2zqfr45jqkncwpywpbtq7jrhxnib5qddtr6npjyezuwd3nqd.onion">SimpleX</a></p>
<h4>About nihilist</h4>
<p style="word-wrap: break-word;"><u>Donate XMR:</u> 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8</p></br><p><u>Contact:</u> nihilist@nowhere.moe (<a href="https://nowhere.moe/nihilist.pubkey">PGP</a>)</p>
</div><!-- /col-lg-4 -->
</div>
@ -118,5 +122,3 @@
</body>
</html>

View File

@ -119,7 +119,7 @@ The door is closed, the conversation remains between Alice and Bob, their conver
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Why is Plausible Deniability Vital?</b></h2> </br> </br>
<h2><b>Why is Plausible Deniability is Vital?</b></h2> </br> </br>
<p>From a legal standpoint, the only way to be protected against that scenario where you're forced to decrypt your harddrive <b>is to be able to deny the existance of said encrypted volume (Plausible Deniability)</b> . If the encrypted volume does not exist, there is no password to be given for it.</p>
<p>So here we need a technology that can provide us Plausible Deniability. <b>That is what Veracrypt can do for us</b>.</p>
<img src="5.png" class="imgRz">