3/ They'll also have connection records going into an entrance node. They can then match up entrance with exit records.
-
-
4/ The match is never perfect, but when combined with other data, can be suggestive.
1 reply 0 retweets 0 likes -
-
Replying to @emptywheel @puellavulnerata
Even more so on VPNs. Andrea will know more, but Tor distributes traffic across exit nodes, making it harder. VPNs don't.
1 reply 0 retweets 0 likes -
Replying to @ErrataRob @puellavulnerata
Is targeting VPNs worth more than metadata?
1 reply 0 retweets 0 likes -
Replying to @emptywheel @puellavulnerata
I'm not sure I understand the question. All targeting VPNs gets you is metadata.
1 reply 0 retweets 0 likes -
Imagine i download a 1-gigabyte file via VPN from a terrorist website. They want metadata (when this happened, how much data was transfered)
2 replies 0 retweets 0 likes -
Replying to @ErrataRob @puellavulnerata
OK, we agree. But there must be SOME content they're getting via Tor. That explains their great dark market successes of late?
2 replies 0 retweets 0 likes -
Replying to @emptywheel @ErrataRob
Those have, *to public appearance*, been endpoint attacks. That doesn't rule out parallel construction to conceal the existence of a...
1 reply 0 retweets 0 likes -
...deanon attack, but it doesn't really support it either.
2 replies 0 retweets 0 likes
One thing I find of note is the nodes they included in the DNC JAR last year, according them the right to collect under 702. Lots of friends
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.