[Noisebridge-discuss] Anonymity on blogs

Ryan Rawson ryanobjc at gmail.com
Wed Sep 14 21:52:53 UTC 2011


Don't forget about things like speaking style, insider only knowledge and
viewpoints all of which if not identifies you, narrows the field
substantially. Just how many people could make such a comment and the enemy
may not need to use tech to identify you. Also, since its not a courtroom,
your employer may not need conclusive evidence to either fire you or hamper
your career.
On Sep 14, 2011 2:41 PM, "Fred McHale" <binaryfever at gmail.com> wrote:
> As Andy pointed out I already screwed up complete anonymity by posting in
a
> public forum. Still an interesting exercise for anyone who doesn't know
how
> to do this, especially since I'm not the only one wanting to say something
> about the situation. Thanks for the advice.
>
> On Wed, Sep 14, 2011 at 2:32 PM, Taylor Alexander <tlalexander at gmail.com
>wrote:
>
>> So I know there are lots of high tech fancy solutions, but what about
just
>> posting from a friend's laptop at a coffee shop? And then I imagine
clearing
>> cookies before, and as someone said using NoScript or something. (I don't
>> actually know anything about this.)
>>
>> Is that a plausible "good enough" solution? Obviously not against a
>> determined adversary, but he did mention he's not even sure they'd be
>> determined.
>>
>> Or really, I'm just wondering, how "good" of a solution is that? Aside
from
>> the obvious "if they find out who his friend is they can find a link back
to
>> him."
>>
>> -Taylor
>>
>>
>> On Wed, Sep 14, 2011 at 2:26 PM, Seth David Schoen <schoen at loyalty.org
>wrote:
>>
>>> Casey Callendrello writes:
>>>
>>> > Tor is a good call, but insufficient against a determined adversary.
>>> > There is also a lot of tracking information your browser can expose.
If
>>> > you want to be truly paranoid, you should post on a completely
different
>>> > computer. For example, you can be fairly accurately de-anonymized by
>>> > tracking the your language + timezone + clock skew + installed
plugins,
>>> > all of which can be determined using Javascript.
>>> >
>>> > A reasonable way to defeat this is to use TOR, create a completely
fresh
>>> > Firefox profile, and install NoScript to block all Javascript.
>>>
>>> For better anonymity, the Tor Project now recommends using the Tor
>>> Browser Bundle; apart from reducing remote sites' ability to query your
>>> browser to learn things about you, it tries to make the browser
>>> population of Tor users more homogeneous.
>>>
>>> --
>>> Seth David Schoen <schoen at loyalty.org> | No haiku patents
>>> http://www.loyalty.org/~schoen/ | means I've no incentive to
>>> FD9A6AA28193A9F03D4BF4ADC11B36DC9C7DD150 | -- Don Marti
>>> _______________________________________________
>>> Noisebridge-discuss mailing list
>>> Noisebridge-discuss at lists.noisebridge.net
>>> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
>>>
>>
>>
>> _______________________________________________
>> Noisebridge-discuss mailing list
>> Noisebridge-discuss at lists.noisebridge.net
>> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
>>
>>
>
>
> --
>
> Fred McHale // 408-840-3733 // binaryfever.com <http://www.binaryfever.com
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.noisebridge.net/pipermail/noisebridge-discuss/attachments/20110914/3792f718/attachment-0003.html>


More information about the Noisebridge-discuss mailing list