med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

343
active users

#deanonymization

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.thenewoil.org/@thenewoil" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>thenewoil</span></a></span> which it <em>inevitably does</em>!</p><ul><li>There is no way to do effective <a href="https://infosec.space/tags/AgeVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgeVerification</span></a> without <a href="https://infosec.space/tags/Deanonymization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deanonymization</span></a> - either explicit or implicit.</li></ul>
LisPiOne issue I consider to remain with low-latency mixnets and overlay networks is that downtime can be deanonymizing.<br><br>Even if one has constant bitrate with randomly-selected short downtime/network degradation simulation, that doesn't really help when one's town loses power entirely a few times in a year or whatever and someone bothers to try and map the downtimes onto known locations of power outages over the same year.<br><br>Is there any sensible model for handling this failure case?<br><br><a class="hashtag" href="https://udongein.xyz/tag/mixnet" rel="nofollow noopener" target="_blank">#Mixnet</a> <a class="hashtag" href="https://udongein.xyz/tag/timinganalysis" rel="nofollow noopener" target="_blank">#TimingAnalysis</a> <a class="hashtag" href="https://udongein.xyz/tag/sidechannels" rel="nofollow noopener" target="_blank">#SideChannels</a> <a class="hashtag" href="https://udongein.xyz/tag/anonymization" rel="nofollow noopener" target="_blank">#Anonymization</a> <a class="hashtag" href="https://udongein.xyz/tag/deanonymization" rel="nofollow noopener" target="_blank">#Deanonymization</a> <a class="hashtag" href="https://udongein.xyz/tag/whynodirecttageditinginapobjectsyet" rel="nofollow noopener" target="_blank">#WhyNoDirectTagEditingInAPObjectsYet</a>
Kevin Karhan :verified:<p>Apparently the <span class="h-card" translate="no"><a href="https://social.bau-ha.us/@CCC" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>CCC</span></a></span> has some infos <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> needs, and <a href="http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/bb8ca1c9262a0af96640" rel="nofollow noopener" target="_blank">it seems they're desperate to get their hands onto that intel</a>.</p><ul><li>Dear folks at the <a href="https://infosec.space/tags/CCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CCC</span></a>, do the <em>right and responsibe thing</em> and send the details to <a href="https://infosec.space/tags/TorProject" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorProject</span></a> so they can assess the relevance re: <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> and take appropriate steps!</li></ul><p>Anyone who has details is asked to sent them in a <a href="https://infosec.space/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a>/MIME-encrypted eMail to [security@torproject.org]( malto:security@torproject.org ) using the Pubkey [ 835B 4E04 F6F7 4211 04C4 751A 3EF9 EF99 6604 DE41 ]( <a href="https://keys.openpgp.org/vks/v1/by-fingerprint/835B4E04F6F7421104C4751A3EF9EF996604DE41" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">keys.openpgp.org/vks/v1/by-fin</span><span class="invisible">gerprint/835B4E04F6F7421104C4751A3EF9EF996604DE41</span></a> ].</p><ul><li>Anonymous submissions are accepted AFAICT - All they care is to enshure the <a href="https://infosec.space/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> of Tor <a href="https://infosec.space/tags/users" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>users</span></a> against <a href="https://infosec.space/tags/deanonymization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deanonymization</span></a> attacks, which can and will be leveraged by <a href="https://infosec.space/tags/dictatorships" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dictatorships</span></a> and supressive <a href="https://infosec.space/tags/regimes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regimes</span></a> if not addressed!</li></ul><p><a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> <a href="https://infosec.space/tags/TorNetwork" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorNetwork</span></a> <a href="https://infosec.space/tags/dread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dread</span></a> <a href="https://infosec.space/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.space/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.space/tags/PleaseBoost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PleaseBoost</span></a> <a href="https://infosec.space/tags/FollowerPower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FollowerPower</span></a> <a href="https://infosec.space/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://infosec.space/tags/forensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forensics</span></a> <a href="https://infosec.space/tags/FLOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FLOSS</span></a> <a href="https://infosec.space/tags/FOOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOOS</span></a> <a href="https://infosec.space/tags/OSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSS</span></a> <a href="https://infosec.space/tags/hardening" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardening</span></a> <a href="https://infosec.space/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> äDigitalForensics <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorBrowser</span></a></p>
h o ʍ l e t t<p><a href="https://mamot.fr/tags/Urgence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Urgence</span></a> à FranceTélévisions : inventer le <a href="https://mamot.fr/tags/floutage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>floutage</span></a> de demain<br><a href="https://larevuedesmedias.ina.fr/urgence-france-televisions-inventer-le-floutage-de-demain" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">larevuedesmedias.ina.fr/urgenc</span><span class="invisible">e-france-televisions-inventer-le-floutage-de-demain</span></a><br><a href="https://mamot.fr/tags/FranceTV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FranceTV</span></a> is creating a new <a href="https://mamot.fr/tags/anonymity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anonymity</span></a> charter with strict <a href="https://mamot.fr/tags/guidelines" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guidelines</span></a> on <a href="https://mamot.fr/tags/voice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>voice</span></a> and face anonymization to protect <a href="https://mamot.fr/tags/sources" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sources</span></a>, as current anonymization methods are susceptible to <a href="https://mamot.fr/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>-driven <a href="https://mamot.fr/tags/deanonymization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deanonymization</span></a>. After reviewing 1100 news segments, 30 were unpublished due to high deanonymization <a href="https://mamot.fr/tags/risk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>risk</span></a>.</p>
LisPi<p><span class="h-card"><a href="https://infosec.exchange/@iampytest1" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>iampytest1</span></a></span> <span class="h-card"><a href="https://hachyderm.io/@dalias" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dalias</span></a></span> <span class="h-card"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>campuscodi</span></a></span> So basically this is the same old "don't expose <a href="https://mastodon.top/tags/darknet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>darknet</span></a> servers to the <a href="https://mastodon.top/tags/clearnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clearnet</span></a>" thing?</p><p>I'd be wary of even reusing the same server across different <a href="https://mastodon.top/tags/darknets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>darknets</span></a>, and spinning up a VM for each is cheap-enough to do with little-enough hassle there's really no good reason not to do it.</p><p><a href="https://mastodon.top/tags/Anonymization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Anonymization</span></a> <a href="https://mastodon.top/tags/DeAnonymization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeAnonymization</span></a></p>