Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Complete Anonymous Server

Name: Anonymous 2013-08-09 2:16

Is it possible to prevent a chat server from knowing who is talking to who?

such that there exists a function negl such that
Pr[A(x,y)=1] < 1/2+negl(x,y)

where Pr is probability and A outputs 1 if the server can correctly guess if x and y are communicating. negl is defined as asymptotically negligible (i.e. negl<1/p(x) where p is some polynomial).

Name: Anonymous 2013-08-09 2:34

I like the idea. There should be this kind of irc channel. Maybe we should modify some simple irc daemon to completely anonymous?

Name: Anonymous 2013-08-09 2:37

Is it possible to prevent a chat server from knowing who is talking to who?
Yeah, that's called Tor.

Name: Anonymous 2013-08-09 3:11

>>1
The server couldn't route chat input to other users if they didn't specify who they were talking to, so instead all chats would go to a central pile of messages that all users have access to. Upon connecting, the user submits a public key and user id to the server, which is made available to all other users. If user A wants to initiate a chat session with user B, user A creates the tuple, (start_token, user_A_id, message_data, user_A_signature), and encrypts it with user B's public key. User B gets the list of new messages, and attempts to decrypt all of them using B's private key. If any of them have a valid start_token at the beginning, the message content and user A's id are processed, an the signature is verified.

It could work if start_token was a content, but that might enable replay attacks. You could make start_token dependant on a timestamp. The cipher would need to resist known plain text attacks.

Oh, this doesn't work since the server can encrypt the start_token with each user's public key and see who is getting messages by tracking the headers of the encrypted messages. The server can tell who sent a message by keeping track of the user's ip addresses and noting which ip the message arrived on. Users would need to either all use the same proxy (which just gives the proxy this information, who can then conspire with the chat server) or an anonymity network.

tldr don't use a central server

Name: >>4 2013-08-09 3:25

You could have a trusted group of friends exchange a shared private key, and they could just encrypt all their messages using the symmetric cipher. Then you would have secure groups. This is better since the server wont have the key that encrypts the start_token. The server will know who is sending what quantity of messages, but wont be able to determine who is receiving them or what they contain. Unless you have a member of your your group that relays decrypted messages to someone.

You would need to do the key exchange in a way so that the server doesn't know who belongs to what group.

Name: Anonymous 2013-08-09 3:38

Dining cryptographers probably applies here.
It's a method of broadcasting messages between a group of k clients such that it's impossible to determine which of the k clients originated the message.
Although this system is decentralised, so maybe not.

Sounds like what you want to do is just connect over Tor or something.

Name: Anonymous 2013-08-09 3:39

>>6
tor is shit

Name: Anonymous 2013-08-09 3:42

>>7
You gunna give a reason?

Name: Anonymous 2013-08-09 3:43

>>8
idiot.

Name: Anonymous 2013-08-09 3:44

>>7,9
poopie brain wee bum face!

Name: Freenet… for the 9xxx times 2013-08-09 4:39

Name: Anonymous 2013-08-09 4:48

>>11
thank you for restoring my faith in /prog/

Name: Anonymous 2013-08-09 5:02

say someone finds an exploit in tor, allowing a node to infect its neighbor nodes. Someone could infect the entire network.

Name: Anonymous 2013-08-09 5:05

>>11
Freenet is java shit, fuck off. If you're too stupid to design your code to be cross-compilable with little manual effort then you can't be trusted for security. And that's to say nothing of the steaming pile of shit that is the JVM. It wouldn't suprise me that Oracle leaves those gaping holes just so they can exploit them.

Name: Anonymous 2013-08-09 5:10

>>11
Timing attacks are possible amongst all consumer grade low latency anonymity networks.
The resources required to mitigate them while still keeping the low latency property are greater than most users can spare, since it quite literally requires you to send a constant stream of traffic even when you have nothing to say.

The other ones (bittorrent attack and email password interception) are also common amongst all protocols that are not fully peer to peer. It an application layer attack that is out of the scope of Tor, since it could have been avoided completely had the website's owners used HTTPS instead of plaintext HTTP.

The only attack on there that actually has relevance to Tor's thread model is the one by the engineering school. Tor wrote a blog post discrediting it, but I'm not familiar with the attack so I won't say anything more on it.

The only reason Tor has such a large "weaknesses" section is that Tor has the most researchers working on it. It says nothing of the actual security of the service except that it's well researched.
Please don't let your ignorance create fear like that

Name: Anonymous 2013-08-09 5:16

>>14
Just compile it to C you twat.

>>15
points taken. But with that said I think I would prefer latency over timing attacks.

Name: Anonymous 2013-08-09 5:25

>>14
OT but Java really failed its mandate. It's not meaningfully cross-platform. You can write code that will run on all systems and interface poorly with all of them, or you can write platform specific code (or use someone else's) and have it work fine if you don't mind the stut                    er.

Oracle put it to good use initially, as an install script for their steaming pile of relational feces. Nobody had Java installed at the time except as a browser plugin, so it was a big warning sign that read: YOU MUST BE THIS ENTERPRISE TO ENTER.

Name: Anonymous 2013-08-09 5:45

>>14
Still waiting on your ANSI C/Scheme/Haskell/Erlang/ATS/OCaml/Standard ML/Coq/Scala/ implementation.

>>15
I am not spreading FUD. Which is why I told OP to pick any he likes. I am just pointing out >>7's plight of all the known weaknesses and exploits of tor. I do concur that since it has more backing, these exploits are being taken a look at. However, OP is asking for an anonymous network, hopefully a mesh network, were nodes are not known or request, only keys are asked. But yeah, all of them have problems, even Freenet:
https://bugs.freenetproject.org/my_view_page.php
I mean, who uses CHAOSNET these days?

Name: Anonymous 2013-08-09 5:56

>>17
https://wiki.freenetproject.org/Installing/POSIX
Java 6 or later. If you want to use a free JVM, OpenJDK has also been reported to work fine with Freenet. Most GNU/Linux distros have this is their repositories; look for "openjdk-6-jre".

Name: >>17 2013-08-09 6:32

>>19
I'm just here to shit on java, not interested in using freenet/tor/whatever. All you've said is "it's a java app" which is nothing new.

Name: Anonymous 2013-08-09 7:53

Name: Anonymous 2013-08-09 8:03

>>20
The point he is making is that you can use any JVM, including OpenJDK, which does not have Oracle's DRM and exploitations. Here are a whole list of them:
https://en.wikipedia.org/wiki/JVM#C_to_bytecode_compilers
https://en.wikipedia.org/wiki/Comparison_of_Java_virtual_machines

Name: >>22 2013-08-09 8:14

Name: Anonymous 2013-08-09 8:58

>>21
I didn't say Java was slow and sadly my name's not Dick.

>>22-23
I didn't bring up any problems switching JVMs will solve. Azul helps but isn't perfect.

Name: Anonymous 2013-08-09 10:32

>>23
They have a list of EVERY virtual machine!?!?
In the world?!?!
How horrifying!
I don't remember telling anybody about mine!

Name: Anonymous 2013-08-11 0:06

well, well, what's this here thread not doing on the front page!

Name: Anonymous 2013-08-11 0:18

>>26
Same thing it was doing on the front page. Festering.

Name: Anonymous 2013-08-11 0:43

Name: FLIP 2013-08-11 1:19

>>28
Written in     FIoC
Stable release     0.3.5

NOPE.mp4

Name: Anonymous 2013-08-11 1:53

>>27
It was more languishing than anything.

Name: Anonymous 2013-08-11 6:12

IT WAS MORE LANGUISHING THAN MY ANUS

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List