Tor, driving lessons – 3
So far we have considered the use of Tor as an isolated application, and described and solved some elementary problems that can compromise the level of privacy and anonymity that can be reached with its use. Today we will face the problem from a different point of view: we will focus not on the software that runs inside the PC, but rather the flow of information that moves between the PC and the Internet, regardless of the programs that generate it.
Anyone following these chats had installed Tor for the first time, will probably have noticed that even the most popular Tor download sites such as the EFF one offer, next to the Tor installation files, some bundles, which contain in addition to Tor also other programs, inevitably including Privoxy.
What is Privoxy?
This is easy. Privoxy is a filtering proxy.
And why do we need it? Isn’t Tor a proxy already?
Let’s take a step back. Between our PC and the servers we access via the Internet there is a flow of information made up of requests and responses to requests. Without loss of generality, we can continue to think about normal web browsing done with a browser like Firefox. Using Tor while browsing “diverts” this flow and forces it to make intermediate stops through the Tor router network before reaching its final destination; these intermediate steps make it difficult to correlate the requests that reach the web servers and their responses with the user who generated them.
By continuing to use the information flow model we can highlight two types of privacy risks.
The first and most trivial is that of a partial “deviation” of this flow, normally channeled into the Tor network through our local Tor proxy, which directly releases some information on the Internet, thus compromising the privacy of navigation. This example is not chosen at random, as it was a problem in the first releases of Tor.
Basically, when we use Tor we tell our browser “use Tor as proxy socks” or “pass everything through Tor”.
Some browsers and Internet applications, some more than others, may not fully honor this request.
The first operation that the browser must perform before establishing the connection that we have requested is to take the name of the server contained in the address of the requested page and translate it into the IP to which to open the connection. To do this, he must open a different connection to a particular server whose address he already knows (the DNS server) to which he can send the host name and receive the corresponding IP. In some cases this new request was not passed through by Tor and therefore it became trivial for an attacker to correlate the IP of someone who had just requested the address of a certain site with the requestor for an anonymous connection that arrived immediately after the same site.
In some cases (typically browser bugs) these requests could go outside of Tor.
The second, and even more serious problem, is when data passes through the flow of information that can identify the user. Connections made through Tor are normal HTTP or HTTPS sessions. The server to which the requests are made, and in the case that non-encrypted HTTP is used, also the outgoing Tor router and whoever is able to sniff the traffic, can intercept and collect everything that is transmitted.
If the user accesses information on his personal site but managed by a provider, or by distraction he sends personal data by filling out a form, perhaps with his credit card number, his anonymity is irremediably compromised.
The problem can be solved, or at least greatly mitigated, by installing (in technical terms: chaining) a second proxy to Tor, Privoxy precisely.
In this case the browser no longer sends the data directly to Tor, but sends them to Privoxy, which can examine them and possibly modify them before sending them on the Net; for example, it can remove the name and surname of the user who for any reason had ended up in the data flow. Similarly it can be configured to intercept the incoming page from Tor and remove all Javascript scripts, so that even if the browser is set to run them, the problem is solved “at the root”.
If you install Tor with the bundle from the EFF site you will end up with Privoxy already installed and configured, and you will also have Torbutton and a very useful information panel called Vidalia, which allows you to view, even geographically, the Tor routing across the Network.
Privoxy has a very detailed control panel accessible from the address http://config.privoxy.org (address that using Privoxy is not on the Internet but on your PC!)
from which it is possible to check the status of the proxy, check the details of the actions performed on a certain page, configure predefined actions or create new ones, enable or disable options.
and finally access the documentation.
A very interesting exercise that I recommend to everyone is to create and enable a filter that systematically replaces a word on the incoming pages. In the configuration file there is a default one (only to be enabled).
Other more sophisticated actions can also be performed such as removing images from advertising sites based on their pixel size, or replacing animated gifs with their first frame, to avoid those hectic pages full of animations.
Finally it is worth mentioning that, after installing it, even a filtering proxy still works much better if there is something connected between the keyboard and the chair; nothing can replace a little attention and foresight on the part of the user.
Today we have identified an effective and very useful solution to some of the errors and distractions that can be committed by surfing the Net anonymously with Tor; next time we’ll talk about installing a Tor server.
Marco Calamari
All Cassandra Crossing releases are available at this address
- RIPE: IPv6 is more than urgent The Internet, that by now indispensable portion of technology that has entered the lives of many, bases its operation on…
- Pupils empowered by video games Dundee (Scotland) – Ten weeks of videogame cognitive training can lead to surprising results: mathematics and logic are no longer…
- Jordan, those who criticize in jail It will do two years in prison 62-year-old Ahmad Oweidi al-Abbadi, a former right-wing deputy in Jordan, found guilty by…
- Tasers are safe They call it “the greatest Tasers study” ever produced. Certainly the report made by some researchers on electric weapons so…
- Intratec / Vira informs users Rome – The conditions in which Italian TLCs find themselves are difficult. The events that have affected Elitel, Telvia and…
- All against the government license fee After the abolition of top-up costs on prepaid credit, the attention of consumers has shifted to other heavy taxes, among…
- Seeweb, chronicle of an attack The first reports, then the confirmations: in the last three days it has become clear the attack that unknown people…
- Mr. Modchips is guilty London – Neil Stanley Higgs, a 39-year-old Englishman from Bristol who ran the Mr. Modchips site specializing in the sale…
- Lead-free electronics killed by tin? Lead is a toxic element, and according to the EU directive “Restriction of the use of certain hazardous substances in…
- Weinberger attempts to promote NYTimes And finally David Weinberger also intervened. Two weeks after the launch of the Public beta of the new New York…
- IFPI in Ukraine sings victory for 36 songs For the Kiev Court of Appeal, mp3.ua infringed HonestMusic’s copyrights, selling 36 songs from the small record company without authorization.…
- Do you use my news? I’ll sue you To the numerous diatribes that have already emerged due to similar circumstances, we must add the contrast between the Moreover…
- Mirrors in orbit against asteroids Mirror, mirror of my desires: who is the biggest asteroid in the realm? But since size doesn’t matter, which one…
- Volume too loud? Infringement of Copyright Edinburgh – Metallic clang, doors creaking, bolts rolling to the ground. In the background a crackling radio, accompanying the work…
- Robots will love men Who has ever hoped to enter into a regular marriage with a robot (or a robot)? According to David Levy,…
- PD, the candidate blogger speaks On Sunday, October 14, more than three million people voted to elect the secretary of the nascent Democratic Party. Five…
- OLPC, Uruguay first conquest Checking it on Intel’s Classmate and on the Israeli ITP-C, XO finally wins its first official government supply , winning…
- 899, a scam, two complaints La Spezia – Two people have been reported to the La Spezia judicial authority on charges of having defrauded about…
- Brain waves to enter avatars The most recent developments of brain interfaces Experiments have so far led to the possibility of giving commands to a…
- The Googlephone is coming According to the Wall Street Journal, Google is on the verge of announcing its arrival in the cell phone market.…
- Indirectly, direct democracy Sydney – It could be called “the party of unrepresentative polls”, it could be called an experiment in indirectly direct…
- ADUC pulls the Telecom jacket Florence – On a war footing with Telecom Italia, ADUC from its observatory reports new problems and complaints raised by…
- The MySpace Meatloaf Between a reality show and a late adolescent meatloaf, MySpaceTv, the recent division of the social network dedicated to videos,…
- Will Verizon Sell User Traffic Data? Verizon Wireless is the largest cell phone operator in the United States. With 62 million consumers and $ 38 billion…
- Bush: immunity for telcos that spy on citizens President Bush is seeing the finely engineered apparatus of “umbrella laws” slip into his hands to exercise indispensable control in…
- France, this is how P2P is fought Paris – There are many French associations that have accepted the invitation of the newly established anti-piracy commission to put…
- The flat on P2P? Unreal and wrong More than one politician and even some authoritative commentators have recently embraced in Italy the idea that a sort of…
- GdF: the pirate companies of Florence In a press release, the Guardia di Finanza of Florence announced that it had carried out a series of inspections…
- ANSA.it closes some serious flaws “Improvising yourself as an ANSA collaborator and freely circulating imaginary news around the Internet”. According to security expert Rosario Valotta…
- BenQ M7, armored and with navigator BenQ does not seem to want to stop with the presentation of new models and, after the C30, unveils the…
- Case publishing, government guidelines The case of the new publishing bill approved by the Council of Ministers continues to arouse controversy and discussion. The…
- Daewoo marries Blu-ray and DivX 6 The Korean Daewoo has announced the imminent launch on the market of a Blu-ray player, the DBP-1000, capable of playing…
- Finland, thousands of compromised passwords They call themselves ZeroPoint and The Magical Pink Bear the crackers who in the past few hours have first violated…
- Petitions at risk of privacy? In the last ten days or so, since hosting a petition that has enjoyed some media coverage, someone has started…
- TRE presents his Skypephone Milan – TRE and Skype yesterday presented the long-awaited 3 Skypephone, a 3G mobile phone offered with integrated the functions…
- Comcast: Yes, we censor P2P Net neutrality has nothing to do with it, traffic shaping has nothing to do with it. According to Comcast, the…
- RAEE, a conference in Rimini Rimini – The volume of waste from electrical and electronic equipment (WEEE) increases every year at a rate three times…
- StumbleUpon infiltrates the entire network In just under seven months StumbleUpon, the best-known social bookmarking platform, changed ownership and reached 3.7 million users. It is…
- Data recovery, clean room in Italy With a press release just released to the press, the company engaged in data recovery activities (data recovery, computer forensics,…
- Leopard reads and writes OpenDocument The open document format OpenDocument (ODF) raises another flag, this time on the upcoming major release of Mac OS X.…
- IFPI.com, Pirate Bay Mocks Phonographs In the ongoing no-holds-barred copyright war, IFPI and record companies just don’t like one: the organization must suffer the setback…
- The phantom vibrations Rome – A curious psychophysical manifestation, difficult to define, is re-emerging from the United States and, subsequently, elsewhere as well.…
- PageRank, chaos is wanted Google clarifies the PageRank affair: Matt Cutts confirmed on the pages of Search Engine Journal that the adjustments to the…
- The pin that embarrasses the giant TLC Can an advertising campaign generate, in a mobile operator, such an embarrassment as to force him to apologize? This is…
- Small complaints grow Those who are used to distilling the important things in the excess of news that traditional media and the Net…
- How many feeders do you have? I’ll tell you who you are The mania (or phobia?) Of statistics is also contagious blogger And small webmasters , in the hope of a providential…
- Free leopard, between bugs and t-shirt See update at the bottom of the article – Rome – There is a lot of talk on the net…
- Qimonda features GDDR5 memories Munich (Germany) – Waiting for the JEDEC consortium to finalize the GDDR5 (Graphics Double Data Rate version 5) memory specification,…
- Hi-tech, a challenge to consumption Milan – “According to the latest research carried out by Gartner, the ICT industry would be responsible for the production…
- Video game developers at a conference in Campania Naples – “GAMECON, the Game and Videogame Show – reads the press release – announces Game in Italy, the first…